{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:55:49Z","timestamp":1725890149662},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642358890"},{"type":"electronic","value":"9783642358906"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-35890-6_16","type":"book-chapter","created":{"date-parts":[[2013,1,11]],"date-time":"2013-01-11T03:45:00Z","timestamp":1357875900000},"page":"217-226","source":"Crossref","is-referenced-by-count":1,"title":["Configuration Assessment as a Service"],"prefix":"10.1007","author":[{"given":"Matteo Maria","family":"Casalino","sequence":"first","affiliation":[]},{"given":"Henrik","family":"Plate","sequence":"additional","affiliation":[]},{"given":"Serena Elisa","family":"Ponta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"7Safe, the University\u00a0of Bedfordshire: Uk security breach investigations report 2010 (2010), \n                    \n                      http:\/\/www.7safe.com\/breach_report\/Breach_report_2010.pdf"},{"key":"16_CR2","unstructured":"Verizon: 2009 data breach investigations report. Verizon (2009), \n                    \n                      http:\/\/www.7safe.com\/breach_report\/Breach_report_2010.pdf"},{"key":"16_CR3","unstructured":"Williams, J., Wichers, D.: Top 10 most critical web application security risks. OWASP (2010), \n                    \n                      https:\/\/www.owasp.org\/index.php\/Top_10_2010-A6"},{"key":"16_CR4","unstructured":"NIST: (National vulnerability databases), \n                    \n                      http:\/\/nvd.nist.gov"},{"key":"16_CR5","unstructured":"NIST: (Security content automation protocols), \n                    \n                      http:\/\/scap.nist.gov"},{"key":"16_CR6","unstructured":"Casalino, M.M., Mangili, M., Plate, H., Ponta, S.E.: Detection of configuration vulnerabilities in distributed (web) environments. In: Proceedings of Security and Privacy in Communication Networks, SecureComm (to appear, 2012)"},{"key":"16_CR7","unstructured":"Waltermire, D., Quinn, S., Scarfone, K.: The technical specification for the security content automation protocol (scap): Scap version 1.2. NIST (2011), \n                    \n                      http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-126-rev2\/SP800-126r2.pdf"},{"key":"16_CR8","unstructured":"OWASP: (Securing Tomcat), \n                    \n                      https:\/\/www.owasp.org\/index.php\/Securing_tomcat"},{"key":"16_CR9","unstructured":"SANS Security: (Seven security (mis)configurations in java web.xml files), \n                    \n                      http:\/\/software-security.sans.org\/blog\/2010\/08\/11\/security-misconfigurations-java-webxml-files"},{"key":"16_CR10","unstructured":"Opengroup: (OpenPegasus), \n                    \n                      https:\/\/collaboration.opengroup.org\/pegasus\/?gpid=18"},{"key":"16_CR11","unstructured":"Distributed Management Task Force: Common information model (CIM) core model. White Paper DSP0111, DMTF (2000)"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneous Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35890-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,20]],"date-time":"2019-01-20T11:40:16Z","timestamp":1547984416000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35890-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642358890","9783642358906"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35890-6_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}