{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:27:56Z","timestamp":1725488876179},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540735960"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73597-7_53","type":"book-chapter","created":{"date-parts":[[2007,8,12]],"date-time":"2007-08-12T20:09:58Z","timestamp":1186949398000},"page":"550-555","source":"Crossref","is-referenced-by-count":1,"title":["Securing Code in Services Oriented Architecture"],"prefix":"10.1007","author":[{"given":"Emilio","family":"Rodriguez Priego","sequence":"first","affiliation":[]},{"given":"Francisco J.","family":"Garc\u00eda","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Web Services Architecture (February 2004), http:\/\/www.w3.org\/TR\/ws-arch\/","key":"53_CR1"},{"unstructured":"Reference Model for Service Oriented Architecture v1.0 (October 2006), http:\/\/docs.oasis-open.org\/soa-rm\/v1.0\/soa-rm.pdf","key":"53_CR2"},{"doi-asserted-by":"crossref","unstructured":"Seshadri, A., Luk, M., Perrig, A., van Doorn, L., Khosla, P.: Externally verifiable code execution. Communications of the ACM (September 2006)","key":"53_CR3","DOI":"10.1145\/1151030.1151054"},{"doi-asserted-by":"crossref","unstructured":"Franz, M., Chandra, D., Gal, A., Haldar, V., Reig, F., Wang, N.: A portable Virtual Machine target for Proof-Carrying Code. In: Proceedings of the 2003 workshop on Interpreters, virtual machines and emulators (June 2003)","key":"53_CR4","DOI":"10.1145\/858570.858573"},{"doi-asserted-by":"crossref","unstructured":"Yau, S.S., Prasad, A., Zhou, X.: An Object-Oriented Approach to Containing Mobile and Active Codes in Large-Scale Networks, words. In: Fourth International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS\u201999) (1999)","key":"53_CR5","DOI":"10.1109\/WORDS.1999.806600"},{"doi-asserted-by":"crossref","unstructured":"Claessens, J., Preneel, B., Vandewalle, J.: How can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions, ACM Transactions on Internet Technology (TOIT) (February 2003)","key":"53_CR6","DOI":"10.1145\/643477.643479"},{"doi-asserted-by":"crossref","unstructured":"Sekar, R., Ramakrishnan, C.R., Ramakrishnan, I.V., Smolka, S.A.: Model-Carrying Code (MCC): a new paradigm for mobile-code security. In: Proceedings of the 2001 workshop on New security paradigms (September 2001)","key":"53_CR7","DOI":"10.1145\/508171.508175"},{"doi-asserted-by":"crossref","unstructured":"Whitman, M.E.: Enemy At The Gate: Threats To Information Security. Communications of the ACM (August 2003)","key":"53_CR8","DOI":"10.1145\/859670.859675"},{"unstructured":"Sima, C.: Are your web applications vulnerable? (October 2004), http:\/\/www.securitydocs.com","key":"53_CR9"},{"unstructured":"Security of Software and Services for Mobile Systems (March 2006), http:\/\/www.s3ms.org","key":"53_CR10"},{"unstructured":"SENSORIA (October 2004), http:\/\/sensoria.fast.de\/","key":"53_CR11"}],"container-title":["Lecture Notes in Computer Science","Web Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73597-7_53.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T09:53:31Z","timestamp":1619517211000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73597-7_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540735960"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73597-7_53","relation":{},"subject":[]}}