{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:01:13Z","timestamp":1743012073619,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":41,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781441983022"},{"type":"electronic","value":"9781441983039"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4419-8303-9_2","type":"book-chapter","created":{"date-parts":[[2011,8,3]],"date-time":"2011-08-03T23:59:31Z","timestamp":1312415971000},"page":"35-57","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["REST and Web Services: In Theory and in Practice"],"prefix":"10.1007","author":[{"given":"Paul","family":"Adamczyk","sequence":"first","affiliation":[]},{"given":"Patrick H.","family":"Smith","sequence":"additional","affiliation":[]},{"given":"Ralph E.","family":"Johnson","sequence":"additional","affiliation":[]},{"given":"Munawar","family":"Hafiz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,6,23]]},"reference":[{"unstructured":"L. Bass and P. Clementes and R. Kazman. Software Architecture in Practice, 2nd Edition. Addison Wesley, 2002.","key":"2_CR1_2"},{"key":"2_CR2_2","volume-title":"Non-compliant and Proud: A Case Study of HTTP Compliance, DCS-R-2935","author":"P Adamczyk","year":"2007","unstructured":"P.\u00a0Adamczyk, M.\u00a0Hafiz, and R.\u00a0Johnson. Non-compliant and Proud: A Case Study of HTTP Compliance, DCS-R-2935. Technical report, University of Illinois, 2007."},{"unstructured":"Amazon. Amazon Simple Storage Service API Reference, May 2011. http:\/\/docs.amazonwebservices.com\/AmazonS3\/latest\/API\/","key":"2_CR3_2"},{"unstructured":"Apache HTTP Server v2.2. Authentication, authorization and access control, May 2011. http:\/\/httpd.apache.org\/docs\/2.2\/howto\/auth.html.","key":"2_CR4_2"},{"unstructured":"T.\u00a0Berners-Lee. Cool URIs don\u2019t change, May 2011. http:\/\/www.w3.org\/Provider\/Style\/URI.html.","key":"2_CR5_2"},{"doi-asserted-by":"crossref","unstructured":"T.\u00a0Berners-Lee, R.\u00a0Fielding, and H.\u00a0Frystyk. RFC 1945: Hypertext Transfer Protocol \u2014 HTTP\/1.0, May 1996.","key":"2_CR6_2","DOI":"10.17487\/rfc1945"},{"unstructured":"J.\u00a0Correia and M.\u00a0Cantara. Gartner sheds light on developer opps in web services. Integration Developers News, June 2003.","key":"2_CR7_2"},{"unstructured":"Dare Obsanjo Blog. Misunderstanding REST: A look at the Bloglines, del.icio.us and Flickr APIs, May 2011. http:\/\/www.25hoursaday.com\/weblog\/PermaLink.aspx?guid=7a2f3df2-83f7-471b-bbe6-2d8462060263.","key":"2_CR8_2"},{"unstructured":"B.\u00a0M. Duska, D.\u00a0Marwood, and M.\u00a0J. Freeley. The measured access characteristics of World-Wide-Web client proxy caches. In USENIX Symposium on Internet Technologies and Systems, USITS, 1997.","key":"2_CR9_2"},{"doi-asserted-by":"crossref","unstructured":"L.\u00a0Dusseault and J.\u00a0Snell. RFC 5789: PATCH Method for HTTP, Mar. 2010.","key":"2_CR10_2","DOI":"10.17487\/rfc5789"},{"doi-asserted-by":"crossref","unstructured":"J.\u00a0Fan and S.\u00a0Kambhampati. A Snapshot of Public Web Services. In SIGMOD Record, Vol. 34, No. 1, Mar. 2005.","key":"2_CR11_2","DOI":"10.1145\/1058150.1058156"},{"key":"2_CR12_2","volume-title":"Architectural Styles and the Design of Network-based Software Architectures","author":"R Fielding","year":"2000","unstructured":"R.\u00a0Fielding. Architectural Styles and the Design of Network-based Software Architectures. Doctoral dissertation. Technical report, University of California, Irvine, 2000."},{"doi-asserted-by":"crossref","unstructured":"R.\u00a0Fielding, J.\u00a0Gettys, J.\u00a0Mogul, H.\u00a0Frystyk, L.\u00a0Masinter, P.\u00a0Leach, and T.\u00a0Berners-Lee. RFC 2616: Hypertext Transfer Protocol \u2014 HTTP\/1.1, June 1999.","key":"2_CR13_2","DOI":"10.17487\/rfc2616"},{"unstructured":"B.\u00a0Fitzpatrick. OpenID, 2005. http:\/\/openid.net\/.","key":"2_CR14_2"},{"doi-asserted-by":"crossref","unstructured":"J.\u00a0Franks, P.\u00a0Hallam-Baker, J.\u00a0Hostetler, S.\u00a0Lawrence, P.\u00a0Leach, A.\u00a0Luotonen, and L.\u00a0Stewart. RFC 2617: HTTP Authentication: Basic and Digest Access Authentication, June 1999.","key":"2_CR15_2","DOI":"10.17487\/rfc2617"},{"unstructured":"J.\u00a0Garrett. Ajax: A New Approach to Web Applications, Feb. 2005. http:\/\/adaptivepath.com\/ideas\/essays\/archives\/000385.php.","key":"2_CR16_2"},{"doi-asserted-by":"crossref","unstructured":"Y.\u00a0Goland, E.\u00a0J. Whitehead, A.\u00a0Faizi, S.\u00a0Carter, and D.\u00a0Jensen. HTTP Extensions for Distributed Authoring WebDAV. Internet proposed standard RFC 2518, Feb. 1999.","key":"2_CR17_2","DOI":"10.17487\/rfc2518"},{"key":"2_CR18_2","volume-title":"and M","author":"J Gregorio","year":"2010","unstructured":"J.\u00a0Gregorio, R.\u00a0Fielding, M.\u00a0Hadley, and M.\u00a0Nottingham. URI Template (draft), Mar. 2010."},{"unstructured":"H.\u00a0Haas. Reconciling Web services and REST services (Keynote Address). In 3rd IEEE European Conference on Web Services (ECOWS 2005), Nov. 2005.","key":"2_CR19_2"},{"doi-asserted-by":"crossref","unstructured":"M.\u00a0Hadley, S.\u00a0Pericas-Geertsen, and P.\u00a0Sandoz. Exploring Hypermedia Support in Jersey. In WS-REST 2010, Apr. 2010.","key":"2_CR20_2","DOI":"10.1145\/1798354.1798378"},{"unstructured":"M.\u00a0Hadley and P.\u00a0Sandoz. JAX-RS: Java API for RESTful Web Services (version 1.1), Sept. 2009.","key":"2_CR21_2"},{"doi-asserted-by":"crossref","unstructured":"E.\u00a0Hammer-Lahav. RFC 5849: The OAuth 1.0 Protocol, Apr. 2010.","key":"2_CR22_2","DOI":"10.17487\/rfc5849"},{"unstructured":"I. Hickson. HTML5: A vocabulary and associated APIs for HTML and XHTML, Oct. 2010.","key":"2_CR23_2"},{"unstructured":"Joe McKendrick. Service Oriented Blog, May 2011. http:\/\/www.zdnet.com\/blog\/service-oriented\/?p0542.","key":"2_CR24_2"},{"doi-asserted-by":"crossref","unstructured":"H.\u00a0Kilov. From semantic to object-oriented data modeling. In First International Conference on Systems Integration, pages 385\u2013393, 1990.","key":"2_CR25_2","DOI":"10.1109\/ICSI.1990.138704"},{"doi-asserted-by":"crossref","unstructured":"S.\u00a0M. Kim and M.\u00a0Rosu. A Survey of Public Web Services. In WWW 2004, 2004.","key":"2_CR26_2","DOI":"10.1145\/1013367.1013451"},{"key":"2_CR27_2","volume-title":"RESTful Web Services","author":"L Richardson","year":"2007","unstructured":"L. Richardson and S. Ruby. RESTful Web Services. O\u2019Reilly, Oct. 2007."},{"unstructured":"M. Nottingham. HTTP Status Report. In QCon, Apr. 2009.","key":"2_CR28_2"},{"unstructured":"Meebo Dev Blog. Introducing XAuth, Apr. 2010. http:\/\/blog.meebo.com\/?p=2391.","key":"2_CR29_2"},{"doi-asserted-by":"crossref","unstructured":"M.\u00a0Nottingham. Web Linking (draft), May 2010.","key":"2_CR30_2","DOI":"10.17487\/rfc5988"},{"unstructured":"H.\u00a0Overdick. Towards resource-oriented BPEL. In C.\u00a0Pautasso and T.\u00a0Gschwind, editors, WEWST, volume 313. CEUR-WS.org, 2007.","key":"2_CR31_2"},{"doi-asserted-by":"crossref","unstructured":"C.\u00a0Pautasso, E.\u00a0Wilde, and A.\u00a0Marinos. First International Workshop on RESTful Design (WS-REST 2010), Apr. 2010.","key":"2_CR32_2","DOI":"10.1145\/1798354.1798375"},{"doi-asserted-by":"crossref","unstructured":"C.\u00a0Pautasso, O.\u00a0Zimmermann, and F.\u00a0Leymann. RESTful Web Services vs. \u201cBig\u201d Web Services: Making the Right Architectural Decision. In WWW \u201908: Proceeding of the 17th international conference on World Wide Web, pages 805\u2013814, New York, NY, USA, 2008. ACM.","key":"2_CR33_2","DOI":"10.1145\/1367497.1367606"},{"unstructured":"P.\u00a0Prescod. Roots of the REST\/SOAP Debate. In Extreme Markup Languages, EML, 2002.","key":"2_CR34_2"},{"doi-asserted-by":"crossref","unstructured":"E.\u00a0Rescorla. RFC 2818: HTTP over TLS, May 2000.","key":"2_CR35_2","DOI":"10.17487\/rfc2818"},{"unstructured":"RESTWiki, May 2011. http:\/\/rest.blueoxen.net\/cgi-bin\/wiki.pl.","key":"2_CR36_2"},{"unstructured":"D.\u00a0Sholler. 2008 SOA User Survey: Adoption Trends and Characteristics, Sept. 2008.","key":"2_CR37_2"},{"issue":"1","key":"2_CR38_2","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MIC.2008.20","volume":"12","author":"S Vinoski","year":"2008","unstructured":"S.\u00a0Vinoski. Serendipitous reuse. IEEE Internet Computing, 12(1):84\u201387, 2008.","journal-title":"IEEE Internet Computing"},{"unstructured":"W3C Working Group Note. Web Services Architecture, May 2011. http:\/\/www.w3.org\/TR\/2004\/NOTE-ws-arch-20040211\/.","key":"2_CR39_2"},{"unstructured":"Web Service Security (WSS). Web Services Security: SOAP Message Security 1.1, Feb. 2006.","key":"2_CR40_2"},{"issue":"5","key":"2_CR41_2","doi-asserted-by":"publisher","first-page":"103","DOI":"10.5381\/jot.2004.3.5.a2","volume":"3","author":"A Zarras","year":"2004","unstructured":"A.\u00a0Zarras. A comparison framework for middleware infrastructures. Journal of Object Technology, 3(5):103\u2013123, 2004.","journal-title":"Journal of Object Technology"}],"container-title":["REST: From Research to Practice"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-8303-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,8]],"date-time":"2025-03-08T03:49:56Z","timestamp":1741405796000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4419-8303-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781441983022","9781441983039"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-8303-9_2","relation":{},"subject":[],"published":{"date-parts":[[2011]]},"assertion":[{"value":"23 June 2011","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}