{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:50:28Z","timestamp":1725490228761},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540749738"},{"type":"electronic","value":"9783540749745"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10383-4_28","type":"book-chapter","created":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T09:49:58Z","timestamp":1259056198000},"page":"389-403","source":"Crossref","is-referenced-by-count":5,"title":["End-to-End Security for Enterprise Mashups"],"prefix":"10.1007","author":[{"given":"Florian","family":"Rosenberg","sequence":"first","affiliation":[]},{"given":"Rania","family":"Khalaf","sequence":"additional","affiliation":[]},{"given":"Matthew","family":"Duftler","sequence":"additional","affiliation":[]},{"given":"Francisco","family":"Curbera","sequence":"additional","affiliation":[]},{"given":"Paula","family":"Austel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"28_CR1","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MIC.2008.114","volume":"12","author":"J. Yu","year":"2008","unstructured":"Yu, J., Benatallah, B., Casati, F., Daniel, F.: Understanding Mashup Development. IEEE Internet Computing\u00a012(5), 44\u201352 (2008)","journal-title":"IEEE Internet Computing"},{"unstructured":"Yahoo! Inc.: Yahoo Pipes, \n                    \n                      http:\/\/pipes.yahoo.com\n                    \n                    \n                   (Last accessed: May 19, 2009)","key":"28_CR2"},{"unstructured":"IBM Corporation: IBM Mashup Center, \n                    \n                      http:\/\/www.ibm.com\/software\/info\/mashup-center\/\n                    \n                    \n                   (Last accessed: May 19, 2009)","key":"28_CR3"},{"key":"28_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1007\/978-3-540-89652-4_62","volume-title":"Service-Oriented Computing \u2013 ICSOC 2008","author":"V. Hoyer","year":"2008","unstructured":"Hoyer, V., Fischer, M.: Market Overview of Enterprise Mashup Tools. In: Bouguettaya, A., Krueger, I., Margaria, T. (eds.) ICSOC 2008. LNCS, vol.\u00a05364, pp. 708\u2013721. Springer, Heidelberg (2008)"},{"issue":"10","key":"28_CR5","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/MC.2007.367","volume":"40","author":"G. Lawton","year":"2007","unstructured":"Lawton, G.: Web 2.0 creates security challenges. Computer\u00a040(10), 13\u201316 (2007)","journal-title":"Computer"},{"unstructured":"Koschmider, A., Torres, V., Pelechano, V.: Elucidating the Mashup Hype: Definitions, Challenges, Methodical Guide and Tools for Mashups. In: Proc. of the Workshop on Mashups, Enterprise Mashups and Lightweight Composition on the Web (MEM 2009), Madrid, Spain (2009), \n                    \n                      http:\/\/integror.net\/mem2009\/papers\/paper14.pdf\n                    \n                    \n                   (Last accessed: May 21, 2009)","key":"28_CR6"},{"unstructured":"OpenID Foundation (OIDF): OpenID Authentication 2.0 - Final, \n                    \n                      http:\/\/openid.net\/specs\/openid-authentication-2_0.html\n                    \n                    \n                   (Last accessed: May 20, 2009)","key":"28_CR7"},{"unstructured":"OAuth Consortium: OAuth Core 1.0, \n                    \n                      http:\/\/oauth.net\/core\/1.0\/\n                    \n                    \n                   (Last accessed: May 20, 2009)","key":"28_CR8"},{"key":"28_CR9","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MIC.2008.98","volume":"12","author":"F. Rosenberg","year":"2008","unstructured":"Rosenberg, F., Curbera, F., Duftler, M.J., Khalaf, R.: Composing RESTful Services and Collaborative Workflows: A Lightweight Approach. Internet Computing\u00a012, 24\u201331 (2008)","journal-title":"Internet Computing"},{"key":"28_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-3-540-74974-5_8","volume-title":"Service-Oriented Computing \u2013 ICSOC 2007","author":"F. Curbera","year":"2007","unstructured":"Curbera, F., Duftler, M., Khalaf, R., Lovell, D.: Bite: Workflow Composition for the Web. In: Kr\u00e4mer, B.J., Lin, K.-J., Narasimhan, P. (eds.) ICSOC 2007. LNCS, vol.\u00a04749, pp. 94\u2013106. Springer, Heidelberg (2007)"},{"unstructured":"Lau, C.: BPM 2.0 \u2013 a REST based architecture for next generation workflow management. In: Devoxx Conference, Antwerp, Belgium (2008), \n                    \n                      http:\/\/www.devoxx.com\/download\/attachments\/1705921\/D8_C_11_07_04.pdf","key":"28_CR11"},{"unstructured":"OASIS: Web Service Business Process Execution Language 2.0 (2006), \n                    \n                      http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=wsbpel\n                    \n                    \n                   (Last accessed: May 28, 2009)","key":"28_CR12"},{"unstructured":"OAuth Consortium: OAuth Security Advisory 2009.1, \n                    \n                      http:\/\/oauth.net\/advisories\/2009-1\n                    \n                    \n                   (Last accessed: May 20, 2009)","key":"28_CR13"},{"key":"28_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-540-85758-7_21","volume-title":"Business Process Management","author":"C. Pautasso","year":"2008","unstructured":"Pautasso, C.: BPEL for REST. In: Dumas, M., Reichert, M., Shan, M.-C. (eds.) BPM 2008. LNCS, vol.\u00a05240, pp. 278\u2013293. Springer, Heidelberg (2008)"},{"unstructured":"Austel, P., Bhola, S., Chari, S., Koved, L., McIntosh, M., Steiner, M., Weber, S.: Secure Delegation for Web 2.0 and Mashups. In: Proc. of the Workshop on Web 2.0 Security and Privacy 2008, W2SP (2008), \n                    \n                      http:\/\/w2spconf.com\/2008\/papers\/sp4.pdf\n                    \n                    \n                   (Last accessed: May 21, 2009)","key":"28_CR15"},{"unstructured":"OASIS: Identity Metasystem Interoperability Version 1.0, \n                    \n                      http:\/\/www.oasis-open.org\/committees\/download.php\/32540\/identity-1.0-spec-cs-01.pdf\/\n                    \n                    \n                   (May 14, 2009)","key":"28_CR16"},{"unstructured":"Microsoft: Microsoft\u2019s Vision for an Identity Metasystem, \n                    \n                      http:\/\/msdn.microsoft.com\/en-us\/library\/ms996422.aspx\n                    \n                    \n                   (May 2005)","key":"28_CR17"},{"unstructured":"SafeMashups Inc.: MashSSL, \n                    \n                      https:\/\/www.safemashups.com\n                    \n                    \n                   (Last accessed: May 19, 2009)","key":"28_CR18"},{"key":"28_CR19","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1145\/1242572.1242655","volume-title":"Proc. of the International Conference on World Wide Web (WWW 2007)","author":"C. Jackson","year":"2007","unstructured":"Jackson, C., Wang, H.J.: Subspace: secure cross-domain communication for web mashups. In: Proc. of the International Conference on World Wide Web (WWW 2007), Banff, Alberta, Canada, pp. 611\u2013620. ACM, New York (2007)"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing \u2013 ICSOC 2007"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10383-4_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,10]],"date-time":"2019-03-10T12:38:57Z","timestamp":1552221537000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10383-4_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783540749738","9783540749745"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10383-4_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}