{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T10:51:31Z","timestamp":1725619891452},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,8]]},"DOI":"10.1109\/securware.2008.24","type":"proceedings-article","created":{"date-parts":[[2008,9,16]],"date-time":"2008-09-16T16:43:14Z","timestamp":1221583394000},"page":"133-138","source":"Crossref","is-referenced-by-count":3,"title":["A Protection Scheme against the Attacks Deployed by Hiding the Violation of the Same Origin Policy"],"prefix":"10.1109","author":[{"given":"Masaru","family":"Takesue","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"Cross Site Reference Forgery An introduction to a common web application weakness","year":"2005","author":"burns","key":"17"},{"journal-title":"Proc 4th Open Web Application Security Project (OWASP) AppSec Conf (SecureComm)","article-title":"requestrodeo: client side protection against session riding","year":"2006","author":"johns","key":"18"},{"journal-title":"MSR-TR-2007-55","article-title":"spectator: detection and containment of javascript worms","year":"2007","author":"livshits","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359531"},{"journal-title":"Handbook of Applied Cryptography","year":"1996","author":"menezes","key":"13","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242654"},{"journal-title":"The Pharming Guide Understanding & Preventing DNS-related Attacks by Phishers","year":"2005","author":"ollmann","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2617"},{"journal-title":"The same origin policy","year":"2001","author":"ruderman","key":"3"},{"journal-title":"Ajax A New Approach to Web Applications","year":"2005","author":"garrett","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2616"},{"journal-title":"The Phishing Guide Understanding & Preventing Phishing Attacks","year":"2004","author":"ollmann","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1141277.1141357"},{"journal-title":"Cross-Site Scripting Worms and Viruses","year":"2006","author":"grossman","key":"6"},{"journal-title":"Ajax Security Basics","year":"2006","author":"hayre","key":"5"},{"journal-title":"Cross-Site Scripting","year":"2005","author":"spett","key":"4"},{"journal-title":"Persistent Client State HTTP Cookies Preliminary Specification","year":"0","key":"9"},{"journal-title":"FIPS-180-1","article-title":"secure hash standard","year":"1995","key":"8"}],"event":{"name":"2008 Second International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE)","start":{"date-parts":[[2008,8,25]]},"location":"Cap Esterel, France","end":{"date-parts":[[2008,8,31]]}},"container-title":["2008 Second International Conference on Emerging Security Information, Systems and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4622544\/4622545\/04622573.pdf?arnumber=4622573","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T07:47:01Z","timestamp":1497772021000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4622573\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,8]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/securware.2008.24","relation":{},"subject":[],"published":{"date-parts":[[2008,8]]}}}