{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:39:39Z","timestamp":1725899979927},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642138683"},{"type":"electronic","value":"9783642138690"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13869-0_17","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T11:24:20Z","timestamp":1277810660000},"page":"257-264","source":"Crossref","is-referenced-by-count":2,"title":["Engineering Attestable Services"],"prefix":"10.1007","author":[{"given":"John","family":"Lyle","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andrew","family":"Martin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"1","key":"17_CR1","first-page":"59","volume":"197","author":"D. Schellekens","year":"2008","unstructured":"Schellekens, D., Wyseur, B., Preneel, B.: Remote Attestation on Legacy Operating Systems With Trusted Platform Modules. ENTCS\u00a0197(1), 59\u201372 (2008)","journal-title":"ENTCS"},{"key":"17_CR2","unstructured":"The Trusted Computing Group: Website (2009)"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Lyle, J., Martin, A.: On the feasibility of remote attestation for web services. In: SecureCom 2009, vol.\u00a03, pp. 283\u2013288 (2009)","DOI":"10.1109\/CSE.2009.213"},{"key":"17_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/11863908_5","volume-title":"Computer Security \u2013 ESORICS 2006","author":"Y. Watanabe","year":"2006","unstructured":"Watanabe, Y., Yoshihama, S., Mishina, T., Kudo, M., Maruyama, H.: Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol.\u00a04189, pp. 65\u201380. Springer, Heidelberg (2006)"},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-540-85886-7_2","volume-title":"Information Security","author":"E. Bangerter","year":"2008","unstructured":"Bangerter, E., Djackov, M., Sadeghi, A.R.: A demonstrative ad hoc attestation system. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol.\u00a05222, pp. 17\u201330. Springer, Heidelberg (2008)"},{"key":"17_CR6","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/1314354.1314363","volume-title":"STC","author":"Y. Gasmi","year":"2007","unstructured":"Gasmi, Y., Sadeghi, A.R., Stewin, P., Unger, M., Asokan, N.: Beyond secure channels. In: STC, pp. 30\u201340. ACM, New York (2007)"},{"key":"17_CR7","unstructured":"OASIS: Web services security: Soap message security 1.1 (2004), \n                    \n                      http:\/\/docs.oasis-open.org\/wss\/v1.1\/"},{"key":"17_CR8","volume-title":"GRID","author":"Y. Demchenko","year":"2005","unstructured":"Demchenko, Y., Gommans, L., de Laat, C., Oudenaarde, B.: Web services and grid security vulnerabilities and threats analysis and model. In: GRID. IEEE, Los Alamitos (2005)"},{"key":"17_CR9","unstructured":"Bhalla, N., Kazerooni, S.: Web service vulnerabilities (2007), \n                    \n                      http:\/\/www.blackhat.com\/presentations\/bh-europe-07\/Bhalla-Kazerooni\/Whitepaper\/bh-eu-07-bhalla-WP.pdf"},{"key":"17_CR10","unstructured":"Gray, N.A.B.: Comparison of web services, java-rmi, and corba service implementation. In: Australasian Workshop on Software and System Architectures (2004)"},{"issue":"2","key":"17_CR11","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/TSC.2008.10","volume":"1","author":"J. Wei","year":"2008","unstructured":"Wei, J., Singaravelu, L., Pu, C.: A secure information flow architecture for web service platforms. IEEE Trans. on Services Computing\u00a01(2), 75\u201387 (2008)","journal-title":"IEEE Trans. on Services Computing"},{"key":"17_CR12","first-page":"265","volume-title":"ACSAC","author":"S. Jiang","year":"2001","unstructured":"Jiang, S., Smith, S., Minami, K.: Securing web servers against insider attack. In: ACSAC, p. 265. IEEE, Los Alamitos (2001)"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13869-0_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:14:56Z","timestamp":1619784896000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13869-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642138683","9783642138690"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13869-0_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}