{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:23:35Z","timestamp":1742991815120,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":13,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811591280"},{"type":"electronic","value":"9789811591297"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9129-7_9","type":"book-chapter","created":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T23:07:29Z","timestamp":1603321649000},"page":"114-128","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Improvements Based on JWT and RBAC for Spring Security Framework"],"prefix":"10.1007","author":[{"given":"Gongxuan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Mingyue","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xinyi","family":"Fan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,22]]},"reference":[{"key":"9_CR1","unstructured":"Young, T.: Ministers back web security position Author. Computing, pp. 123\u2013143 (2008)"},{"key":"9_CR2","unstructured":"Messmer, E.: Major flaw in Java-based Spring Framework allows remote-code execution by attackers. Network World (Online), pp. 74\u201391(2013)"},{"key":"9_CR3","first-page":"13","volume":"4","author":"S-Q Wang","year":"2013","unstructured":"Wang, S.-Q., et al.: The web security password authentication based the single-block hash functio. IERI Procedia 4, 13\u201320 (2013)","journal-title":"IERI Procedia"},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1177\/1550147718801535","volume":"14","author":"LV J\u00e1noky","year":"2018","unstructured":"J\u00e1noky, L.V., et al.: An analysis on the revoking mechanisms for JSON Web Tokens. Int. J. Distrib. Sensor Netw. 14, 53\u201366 (2018)","journal-title":"Int. J. Distrib. Sensor Netw."},{"issue":"5","key":"9_CR5","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/s11042-014-2003-5","volume":"74","author":"F-H Hsu","year":"2015","unstructured":"Hsu, F.-H., et al.: Web security in a windows system as privacy defender in private browsing mode. Multimedia Tools Appl. 74(5), 65\u201378 (2015). https:\/\/doi.org\/10.1007\/s11042-014-2003-5","journal-title":"Multimedia Tools Appl."},{"issue":"2","key":"9_CR6","first-page":"85","volume":"23","author":"C-J Moon","year":"2003","unstructured":"Moon, C.-J., et al.: Symmetric RBAC model that takes the separation of duty and role hierarchies into consideration. Comput. Secur. 23(2), 85\u201399 (2003)","journal-title":"Comput. Secur."},{"issue":"5","key":"9_CR7","doi-asserted-by":"publisher","first-page":"74","DOI":"10.4304\/jcp.8.5.1220-1229","volume":"8","author":"Z Yang","year":"2013","unstructured":"Yang, Z., et al.: Model of domain based RBAC and supporting technologies. J. Comput. 8(5), 74\u201390 (2013)","journal-title":"J. Comput."},{"issue":"2","key":"9_CR8","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s41324-016-0011-4","volume":"24","author":"K Kim","year":"2016","unstructured":"Kim, K., Lee, K.: Real-time processing of spatial attribute information for mobile web based on standard web framework and HTML5. Spatial Inf. Res. 24(2), 93\u2013101 (2016). https:\/\/doi.org\/10.1007\/s41324-016-0011-4","journal-title":"Spatial Inf. Res."},{"issue":"4","key":"9_CR9","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1109\/TPDS.2018.2870652","volume":"30","author":"M Ghafoorian","year":"2019","unstructured":"Ghafoorian, M., et al.: A thorough trust and reputation based RBAC model for secure data storage in the cloud. IEEE Trans. Parallel Distrib. Syst. 30(4), 778\u2013788 (2019)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"9_CR10","unstructured":"Zheng, H.: Design and implementation of business process driven fine-grained authority control system. Shandong University (2017)"},{"issue":"7","key":"9_CR11","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.cose.2009.04.008","volume":"28","author":"E Kirda","year":"2009","unstructured":"Kirda, E., et al.: Client-side cross-site scripting protection. Comput. Secur. 28(7), 65\u201371 (2009)","journal-title":"Comput. Secur."},{"key":"9_CR12","unstructured":"Liang, L.: Design and implementation of mobile application management system based on RBAC security model. University of Electronic Science and Technology (2016)"},{"issue":"11","key":"9_CR13","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1002\/cpe.4399","volume":"30","author":"N Pan","year":"2018","unstructured":"Pan, N., et al.: An efficiency approach for RBAC reconfiguration with minimal roles and perturbation. Concurr. Comput.: Pract. Exp. 30(11), 177\u2013185 (2018)","journal-title":"Concurr. Comput.: Pract. Exp."}],"container-title":["Communications in Computer and Information Science","Security and Privacy in Digital Economy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9129-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T02:25:04Z","timestamp":1619317504000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-9129-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811591280","9789811591297"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9129-7_9","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPDE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Digital Economy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Quzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spde2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spde2020.csp.escience.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"132","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}