{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T12:50:38Z","timestamp":1725454238607},"publisher-location":"New York","reference-count":16,"publisher":"Springer-Verlag","isbn-type":[{"type":"print","value":"0387244859"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-24486-7_10","type":"book-chapter","created":{"date-parts":[[2005,10,9]],"date-time":"2005-10-09T18:15:45Z","timestamp":1128881745000},"page":"131-144","source":"Crossref","is-referenced-by-count":10,"title":["Threat Modelling for Web Services Based Web Applications"],"prefix":"10.1007","author":[{"given":"Lieven","family":"Desmet","sequence":"first","affiliation":[]},{"given":"Bart","family":"Jacobs","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Piessens","sequence":"additional","affiliation":[]},{"given":"Wouter","family":"Joosen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"L. Desmet, B. Jacobs, F. Piessens, and W. Joosen. A generic architecture for web applications to support threat analysis of infrastructural components, Eighth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2004), September 2004, UK, pp 155\u2013160"},{"key":"10_CR2","unstructured":"D. De Cock, K. Wouters, D. Schellekens, D. Singelee, and B. Preneel. Threat modelling for security tokens in web applications, Eighth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2004), September 2004, UK, pp 213\u2013223"},{"key":"10_CR3","unstructured":"R. Grimm and H. Eichst\u00e4dt Threat Modelling for ASP.NET \u2014 Designing Secure Applications, Eighth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2004), September 2004, UK, pp 175\u2013187"},{"key":"10_CR4","unstructured":"E. Bertino, D. Bruschi, S. Franzoni, I. Nai-Fovino, and S. Valtolina. Threat modelling for SQL Server, Eighth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2004), September 2004, UK, pp 189\u2013201"},{"key":"10_CR5","unstructured":"D. W. Chadwick. Threat Modelling for Active Directory. Eighth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2004), September 2004, UK, pp203\u2013212"},{"key":"10_CR6","unstructured":"Microsoft Patterns and Practices: Building Secure ASP.NET Applications, Microsoft Press, January 2003."},{"key":"10_CR7","unstructured":"Microsoft Patterns and Practices: Designing Application Managed Authorization, http:\/\/msdn.microsoft.com\/library\/default.asp?url=\/library\/en-us\/dnbda\/html\/DAMAZ.asp"},{"key":"10_CR8","unstructured":"Microsoft Patterns and Practices: Improving Web application security: Threats and Countermeasures, Microsoft Press, June 2003."},{"key":"10_CR9","unstructured":"W3C Note, SOAP: Simple Object Access Protocol 1.1, May 2000, http:\/\/www.w3.org\/TR\/2000\/NOTE-SOAP-20000508\/"},{"key":"10_CR10","unstructured":"W3C Note, Web Services Description Language (WSDL) 1.1, 15 March 2001, http:\/\/www. w3.org\/TR\/2001 \/NOTE-wsdl-20010315\/"},{"key":"10_CR11","unstructured":"UDDI.org white paper, UDDI Technical White Paper, 6 September 2000, http:\/\/www.uddi.Org\/pubs\/Iru_UDDI_Technical_White_Paper.pdf"},{"key":"10_CR12","unstructured":"Hartman, Flinn, Beznosov, Kawamoto. Mastering Web Services Security. Wiley Publishing 2003."},{"key":"10_CR13","unstructured":"Howard, LeBlanc. Writing Secure Code 2nd edition, Microsoft Press, 2003."},{"key":"10_CR14","unstructured":"Designing Secure Application project (DeSecA), final report, May 2004."},{"key":"10_CR15","unstructured":"M. Lund, I. Hogganvik, F. Seehusen, and K. Stolen. UML profile for security assessment, Technical report STF40 A03066, SINTEF Telecom and Informatics, December 2003."},{"key":"10_CR16","unstructured":"M. Lund, F. den Braber, K. Stolen, and F. Vraalsen. A UML profile for the identification and analysis of security risks during structured brainstorming, Technical report STF40 A03067, SINTEF ICT, May 2004."}],"container-title":["IFIP \u2014 The International Federation for Information Processing","Communications and Multimedia Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-24486-7_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T00:55:01Z","timestamp":1619484901000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-24486-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["0387244859"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/0-387-24486-7_10","relation":{},"subject":[]}}