{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:12:48Z","timestamp":1725574368292},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540235781"},{"type":"electronic","value":"9783540302070"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30207-0_46","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T15:51:21Z","timestamp":1294415481000},"page":"366-373","source":"Crossref","is-referenced-by-count":0,"title":["A Software Engineering Perspective for Services Security"],"prefix":"10.1007","author":[{"given":"Jun","family":"Han","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"46_CR1","unstructured":"Atkinson, B., et al.: Web services security (WS-Security). Working Group Report, IBM (April 2002), http:\/\/www-106.ibm.com\/developerworks\/webservices\/library\/ws-secure\/"},{"key":"46_CR2","unstructured":"Common Criteria Project\/ISO. Common Criteria for Information Technology Security Evaluation, version 2.1 (ISO\/IEC International Standard 15408). NIST, USA and ISO, Switzerland (December 1999), http:\/\/csrc.nist.gov\/cc\/"},{"issue":"1","key":"46_CR3","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MS.2002.976936","volume":"19","author":"A. Ghosh","year":"2002","unstructured":"Ghosh, A., Howell, C., Whittaker, J.A.: Building software securely from the ground up. IEEE Software\u00a019(1), 14\u201316 (2002)","journal-title":"IEEE Software"},{"key":"46_CR4","unstructured":"Ghosh, A., McGraw, G.: An approach for certifying security in software components. In: Proc. 21st National Information Systems Security Conference (1998)"},{"key":"46_CR5","volume-title":"Inside Java 2 Platform Security","author":"L. Gong","year":"2003","unstructured":"Gong, L., Ellison, G., Dageforde, M.: Inside Java 2 Platform Security. Addison-Wesley, Reading (2003)"},{"key":"46_CR6","doi-asserted-by":"crossref","unstructured":"Han, J.: A comprehensive interface definition framework for software components. In: Proc. 1998 Asia-Pacific Software Engineering Conference, pp. 110\u2013117 (1998)","DOI":"10.1109\/APSEC.1998.733601"},{"issue":"10","key":"46_CR7","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/352183.352198","volume":"43","author":"J. Hopkins","year":"2000","unstructured":"Hopkins, J.: Component primer. Communications of the ACM\u00a043(10), 27\u201330 (2000)","journal-title":"Communications of the ACM"},{"key":"46_CR8","doi-asserted-by":"crossref","unstructured":"IEEE. Special issue on building software securely. IEEE Software 19(1) (2002)","DOI":"10.1109\/MS.2002.1020292"},{"issue":"1","key":"46_CR9","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/52.976939","volume":"19","author":"K. Khan","year":"2002","unstructured":"Khan, K., Han, J.: Security aware software composition. IEEE Software\u00a019(1), 34\u201341 (2002)","journal-title":"IEEE Software"},{"key":"46_CR10","doi-asserted-by":"crossref","unstructured":"Khan, K., Han, J.: A security characterisation framework for trustworthy component based software systems. In: Proc. 27th Annual International Computer Software and Applications Conference, pp. 164\u2013169 (2003)","DOI":"10.1109\/CMPSAC.2003.1245337"},{"key":"46_CR11","doi-asserted-by":"crossref","unstructured":"Sewell, P., Vitek, J.: Secure composition of insecure components. In: Proc. 12th IEEE Computer Security Foundations Workshop, pp. 136\u2013150 (1999)","DOI":"10.1109\/CSFW.1999.779769"},{"key":"46_CR12","doi-asserted-by":"crossref","unstructured":"Voas, J.: The challenges of using COTS software in component-based development. IEEE Computer, 44\u201345 (1998)","DOI":"10.1109\/MC.1998.683006"},{"key":"46_CR13","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/52.776948","volume":"4","author":"J. Voas","year":"1999","unstructured":"Voas, J.: Certifying software for high-assurance environments. IEEE Software\u00a0(4), 48\u201354 (1999)","journal-title":"IEEE Software"}],"container-title":["Lecture Notes in Computer Science","Grid and Cooperative Computing - GCC 2004 Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30207-0_46.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:48:49Z","timestamp":1605743329000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30207-0_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540235781","9783540302070"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30207-0_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}