{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T13:09:11Z","timestamp":1726060151394},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030349851"},{"type":"electronic","value":"9783030349868"}],"license":[{"start":{"date-parts":[[2019,11,28]],"date-time":"2019-11-28T00:00:00Z","timestamp":1574899200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-34986-8_8","type":"book-chapter","created":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T10:02:47Z","timestamp":1574848967000},"page":"113-127","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design Issues of a Hybrid Wrapping Attack Protecting Scheme in Cloud Computing Environment"],"prefix":"10.1007","author":[{"given":"Shin-Jer","family":"Yang","sequence":"first","affiliation":[]},{"given":"Yu-Hsuan","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,28]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T.: The NIST Definition of Cloud Computing. National Institute of Standards and Technology (2011)","DOI":"10.6028\/NIST.SP.800-145"},{"key":"8_CR2","unstructured":"Top Threats Working Group: The Notorious Nine: Cloud Computing Top Threats in 2013. Cloud Security Alliance (2013)"},{"key":"8_CR3","unstructured":"XML Signature. \nhttps:\/\/zh.wikipedia.org\/wiki\/XML_Signature"},{"key":"8_CR4","unstructured":"XML Signature Wrapping. \nhttp:\/\/www.ws-attacks.org\/XML_Signature_Wrapping"},{"key":"8_CR5","unstructured":"XML Signature Syntax and Processing Version 2.0, \nhttps:\/\/wwww.3.org\/TR\/xmldsig-core2\/"},{"key":"8_CR6","unstructured":"Simple Object Access Protocol. \nhttps:\/\/en.wikipedia.org\/wiki\/SOAP"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"McIntosh, M., Austel, P.: XML signature element wrapping attacks and countermeasures. In: Proceedings of the 2005 Workshop on Secure Web Services, pp. 20\u201327 (2005)","DOI":"10.1145\/1103022.1103026"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Somorovsky, J., et al.: All your clouds are belong to us: security analysis o cloud management interfaces. In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security, pp. 3\u201314 (2011)","DOI":"10.1145\/2046660.2046664"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Gajek, S., et al.: Analysis of signature wrapping attacks and countermeasures. In: Proceedings of IEEE International Conference on Web Services, pp. 575\u2013582 (2009)","DOI":"10.1109\/ICWS.2009.12"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Jensen, M., et al.: On the effectiveness of XML schema validation for countering XML signature wrapping attacks. In: Proceedings of 1st International Workshop on Securing Services on the Cloud, pp. 7\u201313 (2011)","DOI":"10.1109\/IWSSCloud.2011.6049019"},{"key":"8_CR11","unstructured":"Kouchaksaraei, H.R., Chefranov, A.G.: Countering wrapping attack on XML signature in SOAP message for cloud computing. (IJCSIS) Int. J. Comput. Sci. Inf. Secur. 16, 1310\u20130441 (2013)"},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-319-30348-2_5","volume-title":"Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC \u2013 16\u2019)","author":"Abhinav Nath Gupta","year":"2016","unstructured":"Gupta, A.N., Thilagam, P.S.: Detection of XML signature wrapping attack using node counting. In: Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenge (ISBCC\u20132016), pp. 57\u201363 (2016)"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in E-Business Engineering for Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-34986-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T10:08:18Z","timestamp":1574849298000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-34986-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,28]]},"ISBN":["9783030349851","9783030349868"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-34986-8_8","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2019,11,28]]},"assertion":[{"value":"28 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICEBE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on e-Business Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icebe2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conferences.computer.org\/icebe\/2019\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}