{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,5]],"date-time":"2025-01-05T02:10:17Z","timestamp":1736043017336,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540292272"},{"type":"electronic","value":"9783540320876"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11563952_54","type":"book-chapter","created":{"date-parts":[[2005,10,19]],"date-time":"2005-10-19T11:24:50Z","timestamp":1129721090000},"page":"618-625","source":"Crossref","is-referenced-by-count":2,"title":["Integrative Security Management for Web-Based Enterprise Applications"],"prefix":"10.1007","author":[{"given":"Chen","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Yang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Dawei","family":"Xu","sequence":"additional","affiliation":[]},{"given":"NuerMaimaiti","family":"Heilili","sequence":"additional","affiliation":[]},{"given":"Zuoquan","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"54_CR1","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/MIC.2002.1003134","volume":"6","author":"C. Wege","year":"2002","unstructured":"Wege, C.: Portal Server Technology. IEEE Internet Computing\u00a06, 73\u201377 (2002)","journal-title":"IEEE Internet Computing"},{"key":"54_CR2","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. Sandhu","year":"1996","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-Based Access Control Models. IEEE Computer\u00a029, 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"54_CR3","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramoli, R.: Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and System Security (TISSEC)\u00a04, 224\u2013274 (2001)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"54_CR4","unstructured":"OASIS: Security Assertion Markup Language (SAML) version 2.0 (2005), http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=security"},{"key":"54_CR5","unstructured":"Sun Microsystems: Java Authentication and Authorization Service, JAAS (2003), http:\/\/java.sun.com\/products\/jaas\/"},{"key":"54_CR6","unstructured":"Cox, R., Grosse, E., Pike, R., Presotto, D., Quinlan, S.: Security in Plan 9. In: Proceedings of the 11th USENIX Security Symposium, San Francisco, pp. 3\u201316 (2002)"},{"key":"54_CR7","doi-asserted-by":"crossref","unstructured":"Kristol, D., Montulli, L.: HTTP State Management Mechanism. RFC 2965 (2000)","DOI":"10.17487\/rfc2965"},{"key":"54_CR8","doi-asserted-by":"crossref","unstructured":"Samar, V.: Single Sign-On Using Cookies for Web Applications. In: Proceedings of the 8th IEEE Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, Palo Alto, CA, pp. 158\u2013163 (1999)","DOI":"10.1109\/ENABL.1999.805192"},{"key":"54_CR9","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/4236.865085","volume":"4","author":"J.S. Park","year":"2000","unstructured":"Park, J.S., Sandhu, R.: Secure Cookies on the Web. IEEE Internet Computing\u00a04, 36\u201344 (2000)","journal-title":"IEEE Internet Computing"},{"key":"54_CR10","doi-asserted-by":"crossref","unstructured":"Rigney, C., Willens, S., Rubens, A., Simpson, W.: Remote Authentication Dial in User Service (RADIUS). RFC 2865 (2000)","DOI":"10.17487\/rfc2865"}],"container-title":["Lecture Notes in Computer Science","Advances in Web-Age Information Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11563952_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,5]],"date-time":"2025-01-05T01:51:28Z","timestamp":1736041888000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11563952_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540292272","9783540320876"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11563952_54","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}