{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:10:59Z","timestamp":1773655859206,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2009,5,6]],"date-time":"2009-05-06T00:00:00Z","timestamp":1241568000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Comp. Sci. Res. Dev."],"published-print":{"date-parts":[[2009,11]]},"DOI":"10.1007\/s00450-009-0092-6","type":"journal-article","created":{"date-parts":[[2009,5,5]],"date-time":"2009-05-05T06:28:07Z","timestamp":1241504887000},"page":"185-197","source":"Crossref","is-referenced-by-count":80,"title":["A\u00a0survey of attacks on web services"],"prefix":"10.1007","volume":"24","author":[{"given":"Meiko","family":"Jensen","sequence":"first","affiliation":[]},{"given":"Nils","family":"Gruschka","sequence":"additional","affiliation":[]},{"given":"Ralph","family":"Herkenh\u00f6ner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,5,6]]},"reference":[{"key":"92_CR1","unstructured":"Andrews T, Curbera F, Dholakia H, Goland Y, Klein J, Leymann F, Liu K, Roller D, Smith D, Thatte S, Trickovic I, Weerawarana S (2003) Business Process Execution Language for Web Services Version 1.1. Oasis Standard"},{"key":"92_CR2","unstructured":"Bartel M, Boyer J, Fox B, LaMacchia B, Simon E (2002) XML-Signature Syntax and Processing. W3C Recommendation"},{"key":"92_CR3","doi-asserted-by":"crossref","unstructured":"Bhargavan K, Fournet C, Gordon AD, O\u2019Shea G (2005) An advisor for Web Services security policies. In: SWS \u201905: Proceedings of the 2005 workshop on Secure web services, ACM Press, New York, NY, pp 1\u20139","DOI":"10.1145\/1103022.1103024"},{"key":"92_CR4","unstructured":"Fernando R (2006) Secure web services with apache rampart. Tech rep, WSO2 Oxygen Tank"},{"key":"92_CR5","unstructured":"Gruschka N (2008) Schutz von Web Services durch erweiterte und effiziente Nachrichtenvalidierung. PhD thesis, Christian-Albrechts-University of Kiel, Germany"},{"key":"92_CR6","unstructured":"Gruschka N, Herkenh\u00f6ner R (2006) WS-SecurityPolicy Decision and Enforcement for Web Service Firewalls. In: Proceedings of the IEEE\/IST Workshop on Monitoring, Attack Detection and Mitigation"},{"key":"92_CR7","unstructured":"Gruschka N, Luttenberger N (2006) Protecting Web Services from DoS Attacks by SOAP Message Validation. In: Proceedings of the IFIP TC-11 21. International Information Security Conference (SEC 2006)"},{"key":"92_CR8","unstructured":"Gruschka N, Luttenberger N, Herkenh\u00f6ner R (2006) Event-based SOAP message validation for WS-SecurityPolicy-Enriched web services. In: Proceedings of the 2006 International Conference on Semantic Web & Web Services"},{"key":"92_CR9","unstructured":"Gruschka N, Herkenh\u00f6ner R, Luttenberger N (2007a) Access Control Enforcement for Web Services by Event-Based Security Token Processing. In: Braun T, Carle G, Stiller B (eds) 15. ITG\/Gi Fachtagung Kommunikation in Verteilten Systemen (KiVS 2007), pp 371\u2013382"},{"key":"92_CR10","unstructured":"Gruschka N, Jensen M, Luttenberger N (2007b) A Stateful Web Service Firewall for BPEL. Proceedings of the IEEE International Conference on Web Services (ICWS 2007)"},{"key":"92_CR11","unstructured":"Gudgin M, Hadley M, Rogers T (2006) Web Services Addressing 1.0 \u2013 SOAP Binding. W3C Recommendation"},{"key":"92_CR12","unstructured":"Hors AL, Hegaret PL, Wood L, Nicol G, Robie J, Champion M, Byrne S (2004) Document Object Model (DOM) Level 3 Core Specification. W3C Recommendation"},{"key":"92_CR13","unstructured":"Imamura T, Dillaway B, Simon E (2002) XML Encryption Syntax and Processing. W3C Recommendation"},{"key":"92_CR14","unstructured":"Jayasinghe D (2006) SOA development with Axis2: Understanding Axis2 basis. IBM developerWorks"},{"key":"92_CR15","unstructured":"Jensen M (2008) BPEL Firewall \u2013 Abwehr von Angriffen auf zustandsbehaftete Web Services (german). VDM Verlag Dr. M\u00fcller, Saarbr\u00fccken, ISBN 9783836485517"},{"key":"92_CR16","doi-asserted-by":"crossref","unstructured":"Jensen M, Gruschka N, Luttenberger N (2008) The Impact of Flooding Attacks on Network-based Services. In: Proceedings of the IEEE International Conference on Availability, Reliability and Security","DOI":"10.1109\/ARES.2008.16"},{"key":"92_CR17","unstructured":"Kaler C, Nadalin A (eds) (2005) Web Services Security Policy Language (WS-SecurityPolicy) 1.1"},{"key":"92_CR18","doi-asserted-by":"crossref","unstructured":"Leiwo J, Nikander P, Aura T (2000) Towards network denial of service resistant protocols. In: Proc. of the 15th International Information Security Conference (IFIP\/SEC)","DOI":"10.1007\/978-0-387-35515-3_31"},{"key":"92_CR19","unstructured":"Lindstrom P (2004) Attacking and Defending Web Service. A Spire Research Report"},{"key":"92_CR20","doi-asserted-by":"crossref","unstructured":"McIntosh M, Austel P (2005) XML signature element wrapping attacks and countermeasures. In: SWS \u201905: Proceedings of the 2005 workshop on Secure web services, ACM Press, New York, NY, pp 20\u201327","DOI":"10.1145\/1103022.1103026"},{"key":"92_CR21","unstructured":"Nadalin A, Kaler C, Monzillo R, Hallam-Baker P (2006) Web Services Security: SOAP Message Security 1.1 (WS-Security 2004)"},{"issue":"11","key":"92_CR22","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1145\/188280.188294","volume":"37","author":"RM Needham","year":"1994","unstructured":"Needham RM (1994) Denial of service: an example. Commun ACM 37(11):42\u201346","journal-title":"Commun ACM"},{"key":"92_CR23","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1145\/585058.585075","volume-title":"DocEng \u201902: Proceedings of the 2002 ACM symposium on document engineering","author":"ML Noga","year":"2002","unstructured":"Noga ML, Schott S, L\u00f6we W (2002) Lazy XML processing. In: DocEng \u201902: Proceedings of the 2002 ACM symposium on document engineering. ACM Press, New York, NY, pp 88\u201394"},{"key":"92_CR24","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1515\/PIKO.2005.130","volume":"28","author":"G Sch\u00e4fer","year":"2005","unstructured":"Sch\u00e4fer G (2005) Sabotageangriffe auf Kommunikationsstrukturen: Angriffstechniken und Abwehrma\u00dfnahmen. PIK 28:130\u2013139","journal-title":"PIK"},{"key":"92_CR25","unstructured":"Smith A (2007) Under Attack, Over the Net. Time Magazine http:\/\/www.time.com\/time\/magazine\/article\/0,9171,1626744,00.html . Accessed 29 Apr 2009"},{"key":"92_CR26","unstructured":"The SAX Project (2002) Simple API for XML\u2013SAX 2.0.1 http:\/\/www.saxproject.org . Accessed 29 Apr 2009"},{"key":"92_CR27","unstructured":"Weerawarana S, Curbera F, Leymann F, Storey T, Ferguson DF (2005) Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More. Prentice Hall PTR, Upper Saddle River"}],"container-title":["Computer Science - Research and Development"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00450-009-0092-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00450-009-0092-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00450-009-0092-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T13:32:45Z","timestamp":1559136765000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00450-009-0092-6"}},"subtitle":["Classification and countermeasures"],"short-title":[],"issued":{"date-parts":[[2009,5,6]]},"references-count":27,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2009,11]]}},"alternative-id":["92"],"URL":"https:\/\/doi.org\/10.1007\/s00450-009-0092-6","relation":{},"ISSN":["1865-2034"],"issn-type":[{"value":"1865-2034","type":"print"}],"subject":[],"published":{"date-parts":[[2009,5,6]]}}}