{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:07:22Z","timestamp":1750306042900,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,7]],"date-time":"2017-06-07T00:00:00Z","timestamp":1496793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,7]]},"DOI":"10.1145\/3078861.3084172","type":"proceedings-article","created":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T19:31:40Z","timestamp":1496259100000},"page":"179-182","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Authorization Enforcement Detection"],"prefix":"10.1145","author":[{"given":"Ehood","family":"Porat","sequence":"first","affiliation":[{"name":"Jerusalem College of Technology, Jerusalem, Israel"}]},{"given":"Shmuel","family":"Tikochinski","sequence":"additional","affiliation":[{"name":"Jerusalem College of Technology, Jerusalem, Israel"}]},{"given":"Ariel","family":"Stulman","sequence":"additional","affiliation":[{"name":"Jerusalem College of Technology, Jerusalem, Israel"}]}],"member":"320","published-online":{"date-parts":[[2017,6,7]]},"reference":[{"volume-title":"White Hat Security, 2016","year":"2016","key":"e_1_3_2_1_1_1"},{"journal-title":"The Hacker News.","year":"2015","author":"Khandelwal Swati","key":"e_1_3_2_1_2_1"},{"journal-title":"The Hacker News.","year":"2015","author":"Khandelwal Swati","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","unstructured":"Cross-Site Request Forgery (CSRF). OWASP. Online: https:\/\/www.owasp.org\/index.php?title=Cross-Site_Request_Forgery_(CSRF)&oldid=227768  Cross-Site Request Forgery (CSRF). OWASP. Online: https:\/\/www.owasp.org\/index.php?title=Cross-Site_Request_Forgery_(CSRF)&oldid=227768"},{"key":"e_1_3_2_1_5_1","unstructured":"Wichers D. Petefish P. Sheridan E. Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet. OWASP. Online: https:\/\/www.owasp.org\/index.php\/Cross-Site_Request_Forgery_(CSRF)_Prevention_Cheat_Sheet  Wichers D. Petefish P. Sheridan E. Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet. OWASP. Online: https:\/\/www.owasp.org\/index.php\/Cross-Site_Request_Forgery_(CSRF)_Prevention_Cheat_Sheet"},{"key":"e_1_3_2_1_6_1","unstructured":"SSDEEP. Online: http:\/\/dfrws.org\/sites\/default\/files\/session-files\/paper-identifying_almost_identical_files_using_context_triggered_piecewise_hashing.pdf  SSDEEP. Online: http:\/\/dfrws.org\/sites\/default\/files\/session-files\/paper-identifying_almost_identical_files_using_context_triggered_piecewise_hashing.pdf"},{"key":"e_1_3_2_1_7_1","unstructured":"Tawily B. and Dotta F. Autorize. Online: https:\/\/github.com\/Quitten\/Autorize\/blob\/master\/Autorize.py  Tawily B. and Dotta F. Autorize. Online: https:\/\/github.com\/Quitten\/Autorize\/blob\/master\/Autorize.py"},{"key":"e_1_3_2_1_8_1","unstructured":"Video of the tool: https:\/\/www.dropbox.com\/s\/7up6h46g2zew4pu\/AED.mp4?dl=0  Video of the tool: https:\/\/www.dropbox.com\/s\/7up6h46g2zew4pu\/AED.mp4?dl=0"}],"event":{"name":"SACMAT'17: The 22nd ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Indianapolis Indiana USA","acronym":"SACMAT'17"},"container-title":["Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3084172","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078861.3084172","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:09Z","timestamp":1750215789000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3084172"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,7]]},"references-count":8,"alternative-id":["10.1145\/3078861.3084172","10.1145\/3078861"],"URL":"https:\/\/doi.org\/10.1145\/3078861.3084172","relation":{},"subject":[],"published":{"date-parts":[[2017,6,7]]},"assertion":[{"value":"2017-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}