{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T15:34:37Z","timestamp":1759073677079},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2006,10,1]],"date-time":"2006-10-01T00:00:00Z","timestamp":1159660800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electron Commerce Res"],"published-print":{"date-parts":[[2006,10]]},"DOI":"10.1007\/s10660-006-8678-6","type":"journal-article","created":{"date-parts":[[2006,9,28]],"date-time":"2006-09-28T02:29:49Z","timestamp":1159410589000},"page":"337-353","source":"Crossref","is-referenced-by-count":19,"title":["eInvoke: Secure e-Invoicing based on web services"],"prefix":"10.1007","volume":"6","author":[{"given":"Alexandros","family":"Kaliontzoglou","sequence":"first","affiliation":[]},{"given":"Pelagia","family":"Boutsi","sequence":"additional","affiliation":[]},{"given":"Despina","family":"Polemi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8678_CR1","unstructured":"Apvrille, A., & Girier, V. (2002). XML security time stamping protocol. In Proceedings of Information Security Solutions Europe Conference (ISSE 2002), Paris, France."},{"key":"8678_CR2","unstructured":"Kaliontzoglou, A. et al. (2003). Secure e-Invoicing service based on web services. In Proceedings of the 1st Hellenic Conference on Electronic Democracy, Athens, Greece."},{"key":"8678_CR3","unstructured":"Nadalin, A. et al. (ed.). (2004). Web Services Security: SOAP Message Security 1.0 (WS-Security 2004). OASIS Standard, docs.oasis-open.org\/wss\/2004\/01\/oasis-200401-wss-soap-message-security-1.0.pdf."},{"key":"8678_CR4","unstructured":"Nash, A. et al. (2001). PKI: Implementing & Managing E-Security. McGraw-Hill Osborn Media Publishing."},{"key":"8678_CR5","unstructured":"Accountis Enterprise. (2003). Make the switch to EIPP. White paper-datasheet, www.accountis.com\/website\/accountis_general.pdf ."},{"key":"8678_CR6","unstructured":"Alysis Enterprise. www.alysis.com ."},{"key":"8678_CR7","unstructured":"Sertifitseerimiskeskus, A. S. (2003). The Esthonian ID Card and digital signature concepts: Principles and Solutions. white paper, www.id.ee\/file.php?id=122 ."},{"key":"8678_CR8","unstructured":"Hartman, B. et al. (2003). Mastering Web Services Security. Wiley Publishing."},{"key":"8678_CR9","unstructured":"Meadows, B., & Seaburg L. (eds). (2003). Universal Business Language 1.0 Beta \u2013 OASIS committee draft."},{"key":"8678_CR10","unstructured":"Adams, C. et al. (2001). Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP). Internet Eng. Task Force RFC 3161."},{"key":"8678_CR11","unstructured":"Adams, C., & Lloyd, S. (1999). Understanding Public-Key Infrastructure \u2014 Concepts, Standards and Deployment Considerations. 1st Edition, Macmillan Technical Publishing."},{"key":"8678_CR12","unstructured":"Austin, C., & Pawlan, M. (2000). Advanced Programming for the Java 2 Platform. Addison-Wesley."},{"key":"8678_CR13","unstructured":"CEN\/ISSS e-Invoicing Focus Group. (2003). Report and Recommendations of CEN\/ISSS e-Invoicing Focus Group on Standards and Developments on electronic invoicing. www.cenorm.be\/isss\/Projects\/e-Invoicing ."},{"key":"8678_CR14","unstructured":"Eastlake, D., & Reagle, J. (ed.). (2002). XML Encryption Syntax and Processing, W3C Recommendation, www.w3.org\/TR\/xmlenc-core ."},{"key":"8678_CR15","unstructured":"Armstrong, E. et al. (2002). The Java Web Services Tutorial. Addison-Wesley."},{"key":"8678_CR16","unstructured":"Christenssen, E. et al. (2001). Web Services Description Language (WSDL) 1.1. W3C Note, www.w3.org\/TR\/wsdl ."},{"key":"8678_CR17","unstructured":"eBIS-XML Specifications, Business Application Software Developers Association (BASDA), basda.net\/twiki\/pub\/Core\/DownloadTheSuite\/eBIS-XML-3.05.zip."},{"key":"8678_CR18","unstructured":"Elma Invoice Enterprise. (2000). Enhanced Reliability in eInvoicing. White paper, www.elmaeinvoice.com\/pdf\/Elma_eInvoice1100_eng.pdf"},{"key":"8678_CR19","unstructured":"Emergis Enterprise, www.emergis.com\/en\/solutions\/invoicing\/einvoicing\/"},{"key":"8678_CR20","unstructured":"ETSI Technical Specification. (2002). ETSI TS 101 903 V1.1.1\u2014XML Advanced Electronic Signatures (XAdES)."},{"key":"8678_CR21","unstructured":"Isabel eInvoice Enterprise, Documentation about Isabel eInvoice. www.isabel.behr\/invoice\/en\/more\/download.html ."},{"key":"8678_CR22","doi-asserted-by":"crossref","unstructured":"Wouters, K. et al. (2002). Towards an XML Format for Time-Stamps. In Proceedings of ACM Workshop on XML Security, (pp. 61\u201370). ACM Press, Fairfax, Virginia.","DOI":"10.1145\/764792.764802"},{"key":"8678_CR23","unstructured":"Rowell, M. Open Applications Group (2002). OAGIS\u2014A \u201cCanonical\u201c Business Language. white paper, version 1.0, www.openapplications.org\/downloads\/whitepapers\/whitepaperdocs\/20020429_OAGIS_A_Canonical_Business_Langugage-PDF.zip ."},{"key":"8678_CR24","unstructured":"Sklavos, P. et al. (2001). Time stamping in e-commerce. In Proceedings of the E-Business & E-work Conference (EBEW) 2001, (pp. 546\u2013552). IOS Press, Venice, Italy."},{"key":"8678_CR25","unstructured":"Brandner, R., & Pordesch, U. (2002). Long-term conservation of provability of electronically signed documents. In Proceedings of the Information Security Solutions Europe Conference (ISSE 2002), Paris, France."},{"key":"8678_CR26","unstructured":"Seagha Enterprise, www.seagha.com\/0203.html"},{"key":"8678_CR27","unstructured":"StreamServe Enterprise. (2003). Secure Business Communication: How organizations can effectively safeguard their mission-critical business communication infrastructures, white paper, www.streamserve.com\/pdf\/whitepaper\/WP_EnhancedSecurity_SESWP10-03-E-eng.pdf ."},{"key":"8678_CR28","unstructured":"Bellwood, T. (ed). (2002). UDDI version 2.04 API Specification, UDDI Committee Specification, OASIS Standard, www.oasis-open.org\/committees\/uddi-spec\/doc\/tcspecs.htm#uddiv2"},{"key":"8678_CR29","unstructured":"Bray, T. et al. (2004). Extensible Markup Language (XML) 1.0 (Third Edition), W3C Recommendation, www.w3.org\/TR\/2004\/REC-xml-2004024"},{"key":"8678_CR30","unstructured":"The European Parliament. (1997). Directive 97\/66\/EC of the European Parliament and of the Council of 15 December 1997 concerning the processing of personal data and the protection of privacy in the telecommunications sector."},{"key":"8678_CR31","unstructured":"The European Parliament. (1995). Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data"},{"key":"8678_CR32","unstructured":"The European Parliament. (1996). Directive 96\/9\/EC of the European Parliament and of the Council of 11 March 1996 on the legal protection of databases."},{"key":"8678_CR33","unstructured":"The European Parliament. (1999). Directive 1999\/93\/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures."},{"key":"8678_CR34","unstructured":"The European Parliament. (2001a). Regulation (EC) 45\/2001 of the European Parliament and of the Council of 18 December 2000 on the protection of individuals with regard to the processing of personal data by the Community institutions and bodies and on the free movement of such data."},{"key":"8678_CR35","unstructured":"The European Parliament. (2001b). Council Directive 2001\/115\/EC of 20 December 2001 amending Directive 77\/388\/EEC with view to simplifying, modernizing and harmonizing the conditions laid down for invoicing in respect of value added tax."},{"key":"8678_CR36","unstructured":"The European Parliament. (2002). Directive 2002\/58\/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications)."},{"key":"8678_CR37","unstructured":"Ford, W. et al. (2001). XML key management specification XKMS, W3C note, www.w3.org\/TR\/xkms ."},{"key":"8678_CR38","unstructured":"Meier, W. (2002). eXist: An Open Source Native XML Database. In Lecture Notes In Computer Science, Revised Papers from the NODe 2002 Web and Database-Related Workshops on Web, Web-Services, and Database Systems, (pp. 169\u2013183). Springer-Verlag."},{"key":"8678_CR39","unstructured":"xCBL. org, (2003). XML Common Business Library version 4.00 (xCBL v4.00). www.xcbl.org\/xcbl40\/xcbl40.html ."},{"key":"8678_CR40","unstructured":"XiCrypt Technologies GmbH, eBilling Suite by Xicrypt: Electronic Invoicing, www.xicrypt.com\/ebilling_eng.php ."},{"issue":"7","key":"8678_CR41","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1145\/514236.514241","volume":"45","author":"S. Banerjee","year":"2002","unstructured":"Banerjee, S., & Kumar, Ram L. (2002). Managing electronic interchange of business documents. Commun. ACM 45(7), 96\u2013102.","journal-title":"Commun. ACM"},{"key":"8678_CR42","doi-asserted-by":"crossref","unstructured":"Klein, B., Agne, S., & Dengel, A. (2004). Results of a Study on Invoice-Reading Systems in Germany. Document Analysis Systems VI: 6th International Workshop, Florence, Italy. In Proceedings, Lecture Notes in Computer Science, Springer-Verlag GmbH, Volume 3163\/2004, 451.","DOI":"10.1007\/978-3-540-28640-0_43"},{"key":"8678_CR43","doi-asserted-by":"crossref","unstructured":"Korhonen, R., & Salminen, A. (2003). Visualization of EDI Messages: Facing the Problems in the Use of XML. In Proceedings of the 5th international conference on Electronic commerce, (pp. 465\u2013472) Pittsburgh. Pennsylvania, ACM.","DOI":"10.1145\/948005.948065"}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-006-8678-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10660-006-8678-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-006-8678-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T20:49:52Z","timestamp":1559249392000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10660-006-8678-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,10]]},"references-count":43,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2006,10]]}},"alternative-id":["8678"],"URL":"https:\/\/doi.org\/10.1007\/s10660-006-8678-6","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"value":"1389-5753","type":"print"},{"value":"1572-9362","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,10]]}}}