{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T03:18:32Z","timestamp":1725506312754},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.27","type":"proceedings-article","created":{"date-parts":[[2013,12,18]],"date-time":"2013-12-18T00:46:29Z","timestamp":1387327589000},"page":"180-187","source":"Crossref","is-referenced-by-count":0,"title":["Securing Mobile Mashups with SCCM"],"prefix":"10.1109","author":[{"given":"F.","family":"Batard","sequence":"first","affiliation":[]},{"given":"K.","family":"Boudaoud","sequence":"additional","affiliation":[]},{"given":"M.","family":"Riveill","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Introducing OpenAjax Hub 2 0 and Secure Mashups","year":"0","key":"19"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4627"},{"journal-title":"BONDI","year":"0","key":"17"},{"journal-title":"Intents and Intent Filters","year":"0","key":"23"},{"year":"0","key":"18"},{"journal-title":"Ajax and Mashup Security","year":"0","key":"15"},{"journal-title":"Proc Int l Conf Web Information Systems Eng","article-title":"Context-aware mashups for mobile devices","year":"2008","author":"brodt","key":"16"},{"journal-title":"Proc of the Web 2 0 Security and Privacy 2009 (W2SP 2009)","article-title":"Attacks on javascript mashup communication","year":"2009","author":"barth","key":"13"},{"journal-title":"W3C Candidate Recommendation 24 June 2010","article-title":"Digital signatures for widgets","year":"0","author":"ca?ceres","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367570"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455784"},{"journal-title":"Sun XACML Implementation","year":"0","key":"21"},{"journal-title":"Widgets 1 0 The Widget Landscape (Q1 2008)","year":"2008","author":"caceres","key":"3"},{"year":"0","key":"20"},{"journal-title":"Proc of the 18th International World Wide Web Conference (WWW'2009)","article-title":"Mobile web widgets: Enabler of enterprise mobility work","year":"2009","author":"lee","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1461928.1461945"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242655"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICMSS.2009.5301595"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-85200-1_20","article-title":"Fixed-mobile hybrid mashups: Applying the rest principles to mobile-specific resources","author":"ma?kela?inen","year":"2008","journal-title":"Proc of the 2008 International Workshops on Web Information Systems Engineering"},{"journal-title":"Opera Widgets","year":"0","key":"5"},{"journal-title":"Great Tools to Develop Awesome Apps","year":"0","key":"4"},{"journal-title":"IEEE Web 2 0 Security and Privacy Workshop (W2SP2007)","article-title":"Mashups legitimize man-in-the-middle attacks","year":"2007","author":"karger","key":"9"},{"journal-title":"Proc of the 5th Conference on Network Architectures and Information Systems Security","article-title":"Web 2.0 security: State of the art","year":"2010","author":"batard","key":"8"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2013,7,16]]},"location":"Melbourne, Australia","end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06680839.pdf?arnumber=6680839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T04:26:33Z","timestamp":1498105593000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6680839\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.27","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}