{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:17:39Z","timestamp":1725488259016},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540647928"},{"type":"electronic","value":"9783540686712"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-68671-1_13","type":"book-chapter","created":{"date-parts":[[2007,8,1]],"date-time":"2007-08-01T02:15:31Z","timestamp":1185934531000},"page":"235-256","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Web Browsers and Security"],"prefix":"10.1007","author":[{"given":"Flavio","family":"De Paoli","sequence":"first","affiliation":[]},{"given":"Andre L.","family":"Dos Santos","sequence":"additional","affiliation":[]},{"given":"Richard A.","family":"Kemmerer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1998,6,18]]},"reference":[{"key":"13_CR1","unstructured":"Drew Dean, Edward W. Felten, and Dan S. Wallach, Java Security: From HotJava to Netscape and Beyond, Proc. of 1996 IEEE Symposium on Security and Privacy, (\nhttp:\/\/www.cs.princeton.edu\/sip\/pub\/secure96.html\n\n)."},{"key":"13_CR2","unstructured":"Flavio De Paoli, Andre L. Dos Santos, and Richard A. Kemmerer, Vulnerability of \u201cSecure\u201d Web Browsers, Proceedings of the 20th National Information Systems Security Conference, Baltimore, MD, USA, October 6\u201310, 1997."},{"key":"13_CR3","unstructured":"Digicrime, Online Security Experiments, Digicrime, Inc., (\nhttp:\/\/www.digicrime.com\n\n)."},{"key":"13_CR4","unstructured":"Edward W. Felten, Dirk Balfanz, Drew Dean, and Dan S. Wallach, Web Spoofing: An Internet Con Game, Proceedings of the 20th National Information Systems Security Conference, Baltimore, MD, USA, October 6\u201310, 1997, (\nhttp:\/\/www.cs.princeton.edu\/sip\/pub\/spoofing.html\n\n)."},{"key":"13_CR5","unstructured":"James Gosling, Bill Joy, and Guy Steele, The Java Language Specification, ISBN 0-201-63451-1, The Java Series, Addison Wesley, 1996, (\nhttp:\/\/www.nge.com\/home\/java\/spec10\/index.html\n\n)."},{"key":"13_CR6","unstructured":"Jason Levitt, Internetview: An Application Infrastructure, Information Week, June 1996, (\nhttp:\/\/www.techweb.cmp.com\/iw\/582\/82iojl.html\n\n)."},{"key":"13_CR7","unstructured":"Tim Lindholm and Frank Yellin, The Java Virtual Machine Specification, ISBN 0-201-63452-X, The Java Series, Addison Wesley, 1996."},{"key":"13_CR8","unstructured":"Netscape, \u201cldLiveConnect,\u201d Netscape web site, 1997, \nhttp:\/\/www.home.netscape.com\/comprod\/products\/navigator\/version_3.0\/building_blocks\/liveconnect\/index.html\n\n."},{"key":"13_CR9","unstructured":"D. Martin, S. Rajagopalan and A. Rubin, \u201cBlocking Java Applets at the Firewall,\u201d in Proceedings of the InternetSociety Symposium on Network and Distributed System Security, February 10\u201311, 1997."},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Jim Roskind, Navigator 2.02 Security-Related FAQ, May 1996, (\nhttp:\/\/www.home.netscape.com\/newsref\/std\/java_security_faq.html\n\n).","DOI":"10.1016\/S1353-4858(96)90003-3"},{"key":"13_CR11","unstructured":"Siemens, \u201cEmbedding Java into smart card ICs\u201d, SPECTRUM, Siemens Components Magazine, April 1997, (\nhttp:\/\/www.w2.siemens.de\/components\/com9704\/04spect.htm#VIER\n\n)."},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Lincoln D. Stein, WWW Security Faq, version 1.3.7, March 30, 1997, (\nhttp:\/\/www.genome.wi.mit.edu\/WWW\/faqs\/www-security-faq.html\n\n).","DOI":"10.1016\/S1353-4858(97)90081-7"}],"container-title":["Lecture Notes in Computer Science","Mobile Agents and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-68671-1_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,3]],"date-time":"2020-04-03T06:09:59Z","timestamp":1585894199000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-68671-1_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540647928","9783540686712"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-68671-1_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]},"assertion":[{"value":"18 June 1998","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}