{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:07:45Z","timestamp":1725574065068},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540220541"},{"type":"electronic","value":"9783540247074"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24707-4_107","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T17:05:36Z","timestamp":1294419936000},"page":"949-959","source":"Crossref","is-referenced-by-count":1,"title":["Security Consequences of Messaging Hubs in Many-to-Many E-procurement Solutions"],"prefix":"10.1007","author":[{"given":"Eva","family":"Ponce","sequence":"first","affiliation":[]},{"given":"Alfonso","family":"Dur\u00e1n","sequence":"additional","affiliation":[]},{"given":"Teresa","family":"S\u00e1nchez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"107_CR1","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1080\/10864415.1997.11518287","volume":"1","author":"J. Bailey","year":"1997","unstructured":"Bailey, J., Bakos, Y.: An exploratory study of emerging role of electronic intermediaries. International Journal of Electronic Commerce\u00a01, 7\u201320 (1997)","journal-title":"International Journal of Electronic Commerce"},{"key":"107_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/3-540-44842-X_12","volume-title":"Computational Science and Its Applications - ICCSA 2003","author":"E. Ponce","year":"2003","unstructured":"Ponce, E., Dur\u00e1n, A.: Characterization of the Security Implications of Alternative Eprocurement Topologies. In: Kumar, V., Gavrilova, M.L., Tan, C.J.K., L\u2019Ecuyer, P. (eds.) ICCSA 2003. LNCS, vol.\u00a02669, pp. 114\u2013122. Springer, Heidelberg (2003)"},{"key":"107_CR3","unstructured":"Bischoff, H.: Inter-Enterprise Integration: Creating Partner Intimacy. White Paper. Neftish Technologies (March 2000)"},{"key":"107_CR4","unstructured":"Malcolm, A.: Messaging hub cheap way to get into B2B. Computerworld (April 15, 2003), Retrieved from \n                    \n                      http:\/\/www.computerworld.co.nz\/news.nsf\/UNID\/CC256CED0016AD1ECC256D07007F4146"},{"key":"107_CR5","unstructured":"Ericson, J.: Covisint Resets Strategy. Line 56 (May 2003), Retrieved from \n                    \n                      www.line56.com\/articles\/default.asp?ArticleID=4649"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24707-4_107.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:05:07Z","timestamp":1620011107000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24707-4_107"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540220541","9783540247074"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24707-4_107","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}