{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:32:11Z","timestamp":1743121931390,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044731"},{"type":"electronic","value":"9783642044748"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04474-8_38","type":"book-chapter","created":{"date-parts":[[2009,9,3]],"date-time":"2009-09-03T07:25:17Z","timestamp":1251962717000},"page":"491-506","source":"Crossref","is-referenced-by-count":1,"title":["F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services"],"prefix":"10.1007","author":[{"given":"Matthew","family":"Burnside","sequence":"first","affiliation":[]},{"given":"Angelos D.","family":"Keromytis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"38_CR1","unstructured":"Lemos, R.: TJX theft tops 45.6 million card numbers (March 2008), \n                    \n                      http:\/\/www.securityfocus.com\/news\/11455"},{"key":"38_CR2","unstructured":"Card data stolen from grocery chain (March 2008), \n                    \n                      http:\/\/www.securityfocus.com\/brief\/704"},{"key":"38_CR3","unstructured":"Institute, T.P.: 2007 Annual Study: Cost of a Data Breach(November 2007), \n                    \n                      http:\/\/www.ponemon.org\/press\/PR_Ponemon_2007-COB_071126_F.pdf"},{"issue":"4","key":"38_CR4","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1145\/357401.357402","volume":"2","author":"J.H. Saltzer","year":"1984","unstructured":"Saltzer, J.H., Reed, D.P., Clark, D.D.: End-to-end arguments in system design. ACM Transactions on Computer Systems (TOCS)\u00a02(4), 277\u2013288 (1984)","journal-title":"ACM Transactions on Computer Systems (TOCS)"},{"key":"38_CR5","unstructured":"Regulation (EC) No 45\/2001 of the European Parliament and of the Council of 18 December 2000. Official Journal of the European Communities (December 2001)"},{"key":"38_CR6","unstructured":"Cai, L., Yang, X.: A reference model and system architecture for database firewall. In: Proceedings of IEEE SMC 2005, pp. 504\u2013509 (2005)"},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"Bai, K., Wang, H., Liu, P.: Towards Database Firewall: Mining the Damage Spreading Patterns. In: Proceedings of ACSAC 2006, pp. 178\u2013192 (2006)","DOI":"10.1109\/ACSAC.2006.52"},{"key":"38_CR8","unstructured":"Garrett, J.J.: Ajax: A New Approach to Web Applications (February 2005), \n                    \n                      http:\/\/www.adaptivepath.com\/ideas\/essays\/archives\/000385.php"},{"issue":"9","key":"38_CR9","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","volume":"63","author":"J.H. Saltzer","year":"1975","unstructured":"Saltzer, J.H., Schroeder, M.D.: The protection of information in computer systems. Proceedings of the IEEE\u00a063(9), 1278\u20131308 (1975)","journal-title":"Proceedings of the IEEE"},{"key":"38_CR10","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: Proceedings of the 12th Annual Network and Distributed Systems Security Symposium, NDSS 2005 (2005)"},{"key":"38_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BFb0054122","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"M. Blaze","year":"1998","unstructured":"Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 127\u2013144. Springer, Heidelberg (1998)"},{"key":"38_CR12","unstructured":"JHU-MIT Proxy Re-cryptography Library (March 2008), \n                    \n                      http:\/\/spar.isi.jhu.edu\/~mgreen\/prl\/"},{"key":"38_CR13","unstructured":"Maruyama, H., Imamura, T.: Element-Wise XML Encryption(April 2000), \n                    \n                      http:\/\/lists.w3.org\/Archives\/Public\/xml-encryption\/2000Apr\/att-0005\/01-xmlenc"},{"key":"38_CR14","unstructured":"Cisco ACE XML Gateway (March 2008), \n                    \n                      http:\/\/www.cisco.com\/en\/US\/products\/ps7314\/index.html"},{"key":"38_CR15","unstructured":"WebSphere DataPower XML Security Gateway XS40 (March 2008), \n                    \n                      http:\/\/www-306.ibm.com\/software\/integration\/datapower\/xs40\/"},{"issue":"2","key":"38_CR16","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1145\/505586.505590","volume":"5","author":"E. Damiani","year":"2002","unstructured":"Damiani, E., di Vimercati, S.D.C., Paraboschi, S., Samarati, P.: A fine-grained access control system for XML documents. ACM Transactions on Information and System Security (TISSEC)\u00a05(2), 169\u2013202 (2002)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"38_CR17","doi-asserted-by":"crossref","unstructured":"Luo, B., Lee, D., Lee, W.C., Liu, P.: QFilter: fine-grained run-time XML access control via NFA-based query rewriting. In: The Thirteenth ACM International Conference on Information and Knowledge Management, pp. 543\u2013552 (2004)","DOI":"10.1145\/1031171.1031273"},{"key":"38_CR18","doi-asserted-by":"crossref","unstructured":"Fundulaki, I., Marx, M.: Specifying access control policies for XML documents with XPath. In: Proceedings of the ninth ACM symposium on Access control models and technologies, pp. 61\u201369 (2004)","DOI":"10.1145\/990036.990046"},{"key":"38_CR19","unstructured":"OASIS eXtensible Access Control Markup Language (XACML) (2005), \n                    \n                      http:\/\/www.oasis-open.org\/committees\/security\/"},{"key":"38_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/11767480_24","volume-title":"Applied Cryptography and Network Security","author":"A. Stavrou","year":"2006","unstructured":"Stavrou, A., Locasto, M., Keromytis, A.: W3bcrypt: Encryption as a stylesheet. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol.\u00a03989, pp. 349\u2013364. Springer, Heidelberg (2006)"},{"key":"38_CR21","doi-asserted-by":"crossref","unstructured":"Li, F., Luo, B., Liu, P., Lee, D., Chu, C.H.: Automaton segmentation: A new approach to preserve privacy in XML information brokering. In: Proceedings of the 14th ACM conference on Computer and Communications Security (CCS) (2007)","DOI":"10.1145\/1315245.1315308"},{"key":"38_CR22","unstructured":"Mahmoud, Q.H.: Securing Web Services and the Java WSDP 1.5 XWS-Security Framework (March 2005), \n                    \n                      http:\/\/java.sun.com\/developer\/technicalArticles\/WebServices\/security\/"},{"key":"38_CR23","doi-asserted-by":"crossref","unstructured":"Singaravelu, L., Pu, C.: Fine-grain, end-to-end security for web service compositions. In: IEEE International Conference on Services Computing (SCC 2007), pp. 212\u2013219 (2007)","DOI":"10.1109\/SCC.2007.61"},{"key":"38_CR24","doi-asserted-by":"crossref","unstructured":"Chafle, G., Chandra, S., Mann, V., Nanda, M.G.: Orchestrating composite web services under data flow constraints. In: Proceedings of the IEEE International Conference on Web Services, pp. 211\u2013218 (2005)","DOI":"10.1109\/ICWS.2005.88"},{"issue":"2","key":"38_CR25","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil Pairing. SIAM Journal of Computing\u00a032(2), 586\u2013615 (2003)","journal-title":"SIAM Journal of Computing"},{"key":"38_CR26","unstructured":"Keromytis, A.D., Wright, J.L., de Raadt, T.: The Design of the OpenBSD Cryptographic Framework. In: Proceedings of the USENIX Annual Technical Conference, June 2003, pp. 181\u2013196 (2003)"},{"key":"38_CR27","unstructured":"Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall, M., Reagle, J.: The Platform for Privacy Preferences 1.0 (P3P1.0) Specifcation (April 2002)"},{"key":"38_CR28","unstructured":"Jackson, C., Boneh, D., Mitchell, J.: Transaction generators: Root kits for the web. In: Proceedings of the 2nd USENIX Workshop on Hot Topics in Security (2007)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04474-8_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T12:28:51Z","timestamp":1558268931000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04474-8_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044731","9783642044748"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04474-8_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}