{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:32:47Z","timestamp":1725514367258},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540721598"},{"type":"electronic","value":"9783540721635"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72163-5_1","type":"book-chapter","created":{"date-parts":[[2007,6,5]],"date-time":"2007-06-05T09:27:19Z","timestamp":1181035639000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["Application Security \u2013 Myth Or Reality?"],"prefix":"10.1007","author":[{"given":"William J.","family":"Caelli","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"OECD \u2013 Organisation for Economic Cooperation and Development, Directorate for Science, technology and Industry, Committee for Information, Computer and Communications Policy, Ad Hoc Group of Experts on Guidelines for the Security of Information Systems: Recommendation of the Council Concerning Guidelines for the Security of Information Systems and Explanatory Memorandum to Accompany the Guidelines. DSTI\/ICCP\/AH(90)21\/REV6 (18 September 1992)"},{"key":"1_CR2","unstructured":"The Australian ( 31 January 1995)"},{"key":"1_CR3","unstructured":"The Weekend Australian (13-14 February 1983)"},{"key":"1_CR4","unstructured":"Information Processing Systems \u2013 Open Systems Interconnection \u2013 Basic Reference Model. IS 7498 \/ AS 2777-1985, Standards Australia (1985)"},{"key":"1_CR5","unstructured":"Mimoso, M.S.: Pitfalls aplenty going SOA., Information Security Magazine (5 Feb. 2007), \n                    \n                      http:\/\/searchsecurity.techtarget.com\/originalContent\/0,289142,sid14_gci1241899,00.html\n                    \n                    \n                   cited at 11 Feb. 2007"},{"key":"1_CR6","unstructured":"Hulme, G.: Web apps remain a trouble spot. SearchSecurity.com (5 Feb. 2007), \n                    \n                      http:\/\/searchsecurity.techtarget.com\/originalContent\/0,289142,sid14_gci1241953,00.html\n                    \n                    \n                   cited at 11 Feb. 2007"},{"key":"1_CR7","unstructured":"https:\/\/buildsecurityin.us-cert.gov\/daisy\/bsi\/articles\/best-practices\/assembly\/639.html?branch=1&language=1\n                    \n                    \n                   and \n                    \n                      https:\/\/buildsecurityin.us-cert.gov\/daisy\/bsi\/home.html"},{"key":"1_CR8","unstructured":"http:\/\/developer.mozilla.org\/en\/docs\/Extensions"},{"key":"1_CR9","unstructured":"http:\/\/en.wikiquote.org\/wiki\/Herodotus"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72163-5_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:29:15Z","timestamp":1605763755000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72163-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540721598","9783540721635"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72163-5_1","relation":{},"subject":[]}}