{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T05:54:58Z","timestamp":1757310898644,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:00:00Z","timestamp":1490140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,22]]},"DOI":"10.1145\/3029806.3029813","type":"proceedings-article","created":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T12:34:59Z","timestamp":1490013299000},"page":"321-328","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Aegis"],"prefix":"10.1145","author":[{"given":"Luca","family":"Compagna","sequence":"first","affiliation":[{"name":"SAP Labs France, Mougins, France"}]},{"given":"Daniel Ricardo","family":"dos Santos","sequence":"additional","affiliation":[{"name":"Fondazione Bruno Kessler &amp; SAP Labs France, Trento, Italy"}]},{"given":"Serena Elisa","family":"Ponta","sequence":"additional","affiliation":[{"name":"SAP Labs France, Mougins, France"}]},{"given":"Silvio","family":"Ranise","sequence":"additional","affiliation":[{"name":"Fondazione Bruno Kessler, Trento, Italy"}]}],"member":"320","published-online":{"date-parts":[[2017,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315250"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714633"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36563-8_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.43410"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1776434.1776440"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. of USENIX Sec.","author":"Doup\u00e9 A.","year":"2012","unstructured":"A. Doup\u00e9 , L. Cavedon , C. Kruegel , and G. Vigna . Enemy of the state: A state-aware black-box web vulnerability scanner . In Proc. of USENIX Sec. , 2012 . A. Doup\u00e9, L. Cavedon, C. Kruegel, and G. Vigna. Enemy of the state: A state-aware black-box web vulnerability scanner. In Proc. of USENIX Sec., 2012."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554976"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480503"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076767"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2012.19"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.24143"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23021"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2461542"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23286"},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. of USENIX Sec.","author":"Sun F.","year":"2011","unstructured":"F. Sun , L. Xu , and Z. Su . Static detection of access control vulnerabilities in web applications . In Proc. of USENIX Sec. , 2011 . F. Sun, L. Xu, and Z. Su. Static detection of access control vulnerabilities in web applications. In Proc. of USENIX Sec., 2011."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1017\/S1471068407003158"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-19345-3","volume-title":"Process Mining","author":"van der Aalst W.M.P.","year":"2011","unstructured":"W.M.P. van der Aalst . Process Mining . Springer , 2011 . W.M.P. van der Aalst. Process Mining. Springer, 2011."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1880022.1880034"},{"key":"e_1_3_2_1_19_1","volume-title":"Business Process Management","author":"Weske M.","year":"2007","unstructured":"M. Weske . Business Process Management . Springer , 2007 . M. Weske. Business Process Management. Springer, 2007."},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. of NDSS","author":"Xing L.","year":"2013","unstructured":"L. Xing , Y. Chen , X. Wang , and S. Chen . Integuard: Toward automatic protection of third-party web service integrations . In Proc. of NDSS , 2013 . L. Xing, Y. Chen, X. Wang, and S. Chen. Integuard: Toward automatic protection of third-party web service integrations. In Proc. of NDSS, 2013."}],"event":{"name":"CODASPY '17: Seventh ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Scottsdale Arizona USA","acronym":"CODASPY '17"},"container-title":["Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3029806.3029813","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3029806.3029813","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:14Z","timestamp":1750220594000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3029806.3029813"}},"subtitle":["Automatic Enforcement of Security Policies in Workflow-driven Web Applications"],"short-title":[],"issued":{"date-parts":[[2017,3,22]]},"references-count":20,"alternative-id":["10.1145\/3029806.3029813","10.1145\/3029806"],"URL":"https:\/\/doi.org\/10.1145\/3029806.3029813","relation":{},"subject":[],"published":{"date-parts":[[2017,3,22]]},"assertion":[{"value":"2017-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}