{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:53:46Z","timestamp":1725533626535},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642026164"},{"type":"electronic","value":"9783642026171"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02617-1_80","type":"book-chapter","created":{"date-parts":[[2009,6,17]],"date-time":"2009-06-17T10:22:04Z","timestamp":1245234124000},"page":"788-796","source":"Crossref","is-referenced-by-count":2,"title":["A Study of International Trend Analysis on Web Service Vulnerabilities in OWASP and WASC"],"prefix":"10.1007","author":[{"given":"Soonseok","family":"Kim","sequence":"first","affiliation":[]},{"given":"Haeyoung","family":"Han","sequence":"additional","affiliation":[]},{"given":"Donghwi","family":"Shin","sequence":"additional","affiliation":[]},{"given":"Inkyung","family":"Jeun","sequence":"additional","affiliation":[]},{"given":"HyunCheol","family":"Jeong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"80_CR1","unstructured":"OWASP (Open Web Application Security Project), http:\/\/www.owasp.org"},{"key":"80_CR2","unstructured":"WASC (Web Application Security Consortium), http:\/\/webappsec.org"},{"key":"80_CR3","unstructured":"Kim, S.: A Study of Web Application Attack Detection extended ESM Agent. J. Korea Society Computer & Information\u00a012(1), 161\u2013168 (2008)"},{"key":"80_CR4","unstructured":"Chang, M., Oh, C.: Web Application Attack Prevention by Traffic Analysis. J. Korea Society Computer & Information\u00a013(3), 139\u2013146 (2008)"},{"key":"80_CR5","doi-asserted-by":"crossref","unstructured":"Jacobs, F., Joosen, B.: Software Security: Experiments on the.NET Common Language Run-time and the Shared Source Common Language Infrastructure. Software: IEE Proceedings\u00a0150(5), 303\u2013307 (2003)","DOI":"10.1049\/ip-sen:20030985"},{"key":"80_CR6","unstructured":"Vanden-Berghe, C., Piessens, F., Riordan, J.: A Vulnerability Taxonomy Methodology applied to the Web Services. In: Proc. the 10th Nordic Workshop on Secure IT Systems (2005)"},{"key":"80_CR7","unstructured":"Benjamin-Livshits, V., Monica, S.: Finding Security Vulnerabilities in Java Applications with Static Analysis. Technical Report, Dept. Computer Science, Stanford University (2005)"}],"container-title":["Lecture Notes in Computer Science","Advances in Information Security and Assurance"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02617-1_80","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T19:36:21Z","timestamp":1558380981000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02617-1_80"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642026164","9783642026171"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02617-1_80","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}