{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:51:12Z","timestamp":1740099072888,"version":"3.37.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319951614"},{"type":"electronic","value":"9783319951621"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-95162-1_32","type":"book-chapter","created":{"date-parts":[[2018,7,3]],"date-time":"2018-07-03T04:15:34Z","timestamp":1530591334000},"page":"469-484","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Implementation of the OAuth 2.0 for\u00a0an Enterprise Service Bus"],"prefix":"10.1007","author":[{"given":"Alysson","family":"de Sousa Ribeiro","sequence":"first","affiliation":[]},{"given":"Edna Dias","family":"Canedo","sequence":"additional","affiliation":[]},{"given":"S\u00e9rgio Ant\u00f4nio","family":"de Andrade Freitas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,4]]},"reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Agilar, E., Almeida, R., Canedo, E.: A systematic mapping study on legacy system modernization. In: The 28th International Conference on Software Engineering and Knowledge Engineering, San Francisco Bay, California, USA - SEKE, pp. 345\u2013350 (2016)","DOI":"10.18293\/SEKE2016-059"},{"key":"32_CR2","volume-title":"Programming Erlang: Software for a Concurrent World","author":"J Armstrong","year":"2007","unstructured":"Armstrong, J.: Programming Erlang: Software for a Concurrent World. Pragmatic Bookshelf, Armstrong (2007)"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Bansal, C., Bhargavan, K., Maffeis, S.: Discovering concrete attacks on website authorization by formal analysis. In: 2012 IEEE 25th Computer Security Foundations Symposium, pp. 247\u2013262, June 2012","DOI":"10.1109\/CSF.2012.27"},{"key":"32_CR4","series-title":"The Fraunhofer IESE Series on Software and Systems Engineering","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-319-05047-8_5","volume-title":"Aligning Organizations Through Measurement","author":"V Basili","year":"2014","unstructured":"Basili, V., Trendowicz, A., Kowalczyk, M., Heidrich, J., Seaman, C., M\u00fcnch, J., Rombach, D.: Phase 2: define goals, strategies, and measurement. Aligning Organizations Through Measurement. TFISSSE, pp. 29\u201367. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-05047-8_5"},{"issue":"5","key":"32_CR5","first-page":"15","volume":"6","author":"R Bhatia","year":"2016","unstructured":"Bhatia, R., Ganpati, A.: In depth analysis of web performance testing tools. IRACST Eng. Sci. Technol. Int. J. (ESTIJ) 6(5), 15\u201319 (2016). ISSN 2250\u20133498. In Depth","journal-title":"IRACST Eng. Sci. Technol. Int. J. (ESTIJ)"},{"key":"32_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10586-016-0677-3","volume":"20","author":"C-J Chae","year":"2017","unstructured":"Chae, C.-J., Kim, K.-B., Cho, H.-J.: A study on secure user authentication and authorization in OAuth protocol. Cluster Comput. 20, 1\u20139 (2017)","journal-title":"Cluster Comput."},{"key":"32_CR7","unstructured":"da Concei\u00e7\u00e3o, R.A.: Um Protocolo de Autentica\u00e7\u00e3o e Autoriza\u00e7\u00e3o Seguro para Arquiteturas Orientadas a Servi\u00e7os. Ph.D. thesis, Universidade de Bras\u00edlia (2014)"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"de Sousa Ribeiro, A., Canedo, E.D.: Solutions analysis of authentication and authorization for service oriented architectures. In: 2016 11th Iberian Conference on Information Systems and Technologies (CISTI), June Gran Canaria, Spain, pp. 1\u20136 (2016)","DOI":"10.1109\/CISTI.2016.7521451"},{"key":"32_CR9","unstructured":"Hammer-Lahav, E.: Introducing OAuth 2.0. Hueniverse, May 2010"},{"key":"32_CR10","doi-asserted-by":"crossref","unstructured":"Hammer-Lahav, E.: The OAuth 1.0 protocol. Internet engineering task force (IETF). Request for comments: 5849, April 2010","DOI":"10.17487\/rfc5849"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Hardt,D.: The OAuth 2.0 authorization framework (2012)","DOI":"10.17487\/rfc6749"},{"issue":"6","key":"32_CR12","doi-asserted-by":"publisher","first-page":"1632","DOI":"10.1109\/JBHI.2015.2469718","volume":"20","author":"H Honko","year":"2016","unstructured":"Honko, H., Andalibi, V., Aaltonen, T., Parak, J., Saaranen, M., Viik, J., Korhonen, I.: W2E\u2013wellness warehouse engine for semantic interoperability of consumer health data. IEEE J. Biomed. Health Inf. 20(6), 1632\u20131639 (2016)","journal-title":"IEEE J. Biomed. Health Inf."},{"issue":"3","key":"32_CR13","first-page":"774","volume":"8","author":"N Jha","year":"2017","unstructured":"Jha, N., Popli, R.: Comparative analysis of web applications using JMeter. Int. J. 8(3), 774\u2013777 (2017)","journal-title":"Int. J."},{"key":"32_CR14","volume-title":"SOA Approach to Integration: XML, Web Services, ESB, and BPEL in Real-world SOA Projects","author":"MB Juric","year":"2007","unstructured":"Juric, M.B.: SOA Approach to Integration: XML, Web Services, ESB, and BPEL in Real-world SOA Projects. Packt Publishing Ltd., Birmingham (2007)"},{"key":"32_CR15","unstructured":"Kao, C.H., Lin, C.C., Lu, H.T.: Toward automatic performance testing for rest-based web applications. In: The Eleventh International Conference on Software Engineering Advances - ICSEA 2016 - Rome, Italy, pp. 81\u201387 (2016)"},{"issue":"6","key":"32_CR16","first-page":"93","volume":"2","author":"G Kaur","year":"2013","unstructured":"Kaur, G., Aggarwal, D.: A survey paper on social sign-on protocol OAuth 2.0. J. Eng. Comput. Appl. Sci. 2(6), 93\u201396 (2013)","journal-title":"J. Eng. Comput. Appl. Sci."},{"key":"32_CR17","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.flowmeasinst.2015.08.013","volume":"48","author":"R Kotz\u00e9","year":"2016","unstructured":"Kotz\u00e9, R., Ricci, S., Birkhofer, B., Wiklund, J.: Performance tests of a new non-invasive sensor unit and ultrasound electronics. Flow Measur. Instrum. 48, 104\u2013111 (2016). https:\/\/doi.org\/10.1016\/j.flowmeasinst.2015.08.013","journal-title":"Flow Measur. Instrum."},{"key":"32_CR18","volume-title":"Introducing Erlang: Getting Started in Functional Programming","author":"SS Laurent","year":"2017","unstructured":"Laurent, S.S.: Introducing Erlang: Getting Started in Functional Programming. O\u2019Reilly Media, Inc., Newton (2017)"},{"key":"32_CR19","doi-asserted-by":"crossref","unstructured":"Memeti, A., Selimi, B., Besimi, A., \u00c7i\u00e7o, B.: A framework for flexible rest services: decoupling authorization for reduced service dependency. In: 2015 4th Mediterranean Conference on Embedded Computing (MECO), pp. 51\u201355, June 2015","DOI":"10.1109\/MECO.2015.7181861"},{"key":"32_CR20","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-1-4842-2863-0_14","volume-title":"Learn FileMaker Pro 16","author":"MC Munro","year":"2017","unstructured":"Munro, M.C.: Text functions (JSON). In: Munro, M.C. (ed.) Learn FileMaker Pro 16, pp. 313\u2013320. Apress, Berkeley (2017). https:\/\/doi.org\/10.1007\/978-1-4842-2863-0_14"},{"key":"32_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-319-64483-7_14","volume-title":"Trust, Privacy and Security in Digital Business","author":"HV Nguyen","year":"2017","unstructured":"Nguyen, H.V., Tolsdorf, J., Lo Iacono, L.: On the security expressiveness of REST-based API definition languages. In: Lopez, J., Fischer-H\u00fcbner, S., Lambrinoudakis, C. (eds.) TrustBus 2017. LNCS, vol. 10442, pp. 215\u2013231. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-64483-7_14"},{"key":"32_CR22","doi-asserted-by":"crossref","unstructured":"Shang, C., Yang, Z., Liu, Q., Zhao, C.: SAML based unified access control model for inter-platform educational resources. In: 2008 International Conference on Computer Science and Software Engineering, vol. 5, pp. 909\u2013912, December 2008","DOI":"10.1109\/CSSE.2008.261"},{"key":"32_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-319-20550-2_13","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"E Shernan","year":"2015","unstructured":"Shernan, E., Carter, H., Tian, D., Traynor, P., Butler, K.: More guidelines than rules: CSRF vulnerabilities from noncompliant OAuth 2.0 implementations. In: Almgren, M., Gulisano, V., Maggi, F. (eds.) DIMVA 2015. LNCS, vol. 9148, pp. 239\u2013260. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-20550-2_13"},{"key":"32_CR24","doi-asserted-by":"crossref","unstructured":"Tassanaviboon, A., Gong, G.: OAuth and abe based authorization in semi-trusted cloud computing: Aauth. In: Proceedings of the Second International Workshop on Data Intensive Computing in the Clouds, DataCloud-SC 2011, pp. 41\u201350. ACM, New York (2011)","DOI":"10.1145\/2087522.2087531"},{"key":"32_CR25","doi-asserted-by":"crossref","unstructured":"Wen, J., Zhang, M., Li, X.: The study on the application of ban logic in formal analysis of authentication protocols. In: Proceedings of the 7th International Conference on Electronic Commerce, pp. 744\u2013747. ACM (2005)","DOI":"10.1145\/1089551.1089685"},{"key":"32_CR26","unstructured":"Williams, J.L., Cramer, D.: System and method for validating documentation of representational state transfer (rest) services. US Patent 9,621,440, 11 April 2017"},{"issue":"1","key":"32_CR27","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/TSC.2010.33","volume":"5","author":"J Xu","year":"2012","unstructured":"Xu, J., Zhang, D., Liu, L., Li, X.: Dynamic authentication for cross-realm SOA-based business processes. IEEE Trans. Serv. Comput. 5(1), 20\u201332 (2012)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"32_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-319-54380-2_10","volume-title":"Enterprise Security","author":"F Yahya","year":"2017","unstructured":"Yahya, F., Walters, R.J., Wills, G.B.: Using goal-question-metric (GQM) approach to assess security in cloud storage. In: Chang, V., Ramachandran, M., Walters, R.J., Wills, G. (eds.) Enterprise Security. LNCS, vol. 10131, pp. 223\u2013240. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-54380-2_10"},{"key":"32_CR29","doi-asserted-by":"crossref","unstructured":"Yang, F., Manoharan, S.: A security analysis of the oauth protocol. In: 2013 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM), pp. 271\u2013276, August 2013","DOI":"10.1109\/PACRIM.2013.6625487"},{"key":"32_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/978-3-319-52015-5_48","volume-title":"Smart Computing and Communication","author":"Y Yuan","year":"2017","unstructured":"Yuan, Y., Li, B., Kreger, H.: SOA reference architecture: standards and analysis. In: Qiu, M. (ed.) SmartCom 2016. LNCS, vol. 10135, pp. 469\u2013476. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-52015-5_48"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-95162-1_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,20]],"date-time":"2019-10-20T04:10:35Z","timestamp":1571544635000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-95162-1_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319951614","9783319951621"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-95162-1_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}