{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T16:20:23Z","timestamp":1756311623559},"publisher-location":"Berlin\/Heidelberg","reference-count":16,"publisher":"Springer-Verlag","isbn-type":[{"type":"print","value":"3540226109"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-26772-7_6","type":"book-chapter","created":{"date-parts":[[2006,2,27]],"date-time":"2006-02-27T07:57:43Z","timestamp":1141027063000},"page":"71-83","source":"Crossref","is-referenced-by-count":10,"title":["Security for GIS N-tier Architecture"],"prefix":"10.1007","author":[{"given":"Michael","family":"Govorov","sequence":"first","affiliation":[]},{"given":"Youry","family":"Khmelevsky","sequence":"additional","affiliation":[]},{"given":"Vasiliy","family":"Ustimenko","sequence":"additional","affiliation":[]},{"given":"Alexei","family":"Khorev","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"ArcIMS 4 Architecture and Functionality (2002) An ESRI White Paper"},{"key":"6_CR2","first-page":"73","volume":"25","author":"N.L. Biggs","year":"1988","unstructured":"Biggs NL (1988) Graphs with large girth, Ars Combinatoria 25, pp 73\u201380","journal-title":"Ars Combinatoria"},{"key":"6_CR3","unstructured":"Bollobas (1976) Extremal Graph Theory, Academic Press"},{"key":"6_CR4","unstructured":"Computer Networking: A Top-Down Approach Featuring the Internet (2001) Addison Wesley Longman, Online Course"},{"key":"6_CR5","unstructured":"De S, Eastman CM, Farkas C (2002) Secure Access Control in a Multi-user Geodatabase, 22nd Annual ESRI International User Conference"},{"key":"6_CR6","unstructured":"Heimann J (2003) Oracle 9i Application Server, Release 2, Security"},{"key":"6_CR7","unstructured":"iWrapper software (2002) eSpatial, http:\/\/www.espatial.com\/products\/iwrapper.htm"},{"key":"6_CR8","unstructured":"New name: The Oracle Content Management SDK (2003) http:\/\/otn.oracle.com\/products\/ifs\/content.html"},{"key":"6_CR9","unstructured":"OpenGIS Web Map Server Interface Implementation Specification, Revision 1.0.0 (2000) OpenGIS Project Document 00-028"},{"key":"6_CR10","unstructured":"Security and ArcIMS (2001) An ESRI White Paper"},{"key":"6_CR11","unstructured":"Security and the Oracle Internet File System, Oracle Internet File System (2000) Technical White Paper"},{"key":"6_CR12","unstructured":"System Design Strategies, (2003) An ESRI White Paper"},{"key":"6_CR13","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1023\/A:1020686216463","volume":"74","author":"V. Ustimenko","year":"2002","unstructured":"Ustimenko V (2002) Graphs with special arcs and Cryptography, Acta Applicandae Mathematicae, 74, pp 117\u2013153","journal-title":"Acta Applicandae Mathematicae"},{"key":"6_CR14","unstructured":"Web Services Security: SOAP Message Security 1.0 (2004) OASIS, WSSecurity, http:\/\/www.oasis-open.org\/committees\/documents.php"},{"key":"6_CR15","unstructured":"WebLogic Security Framework: Working with Your Security Eco-System (2003) BEA, White Paper"},{"key":"6_CR16","unstructured":"WebSphere (2003) Web Services Handbook, IBM, Version 5"}],"container-title":["Developments in Spatial Data Handling"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-26772-7_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T20:59:49Z","timestamp":1619557189000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-26772-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["3540226109"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-26772-7_6","relation":{},"subject":[]}}