{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T17:10:34Z","timestamp":1649092234186},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,5,15]],"date-time":"2013-05-15T00:00:00Z","timestamp":1368576000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electron Commer Res"],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1007\/s10660-013-9115-2","type":"journal-article","created":{"date-parts":[[2013,5,14]],"date-time":"2013-05-14T14:55:16Z","timestamp":1368543316000},"page":"317-328","source":"Crossref","is-referenced-by-count":4,"title":["The security service rating design for IT convergence services"],"prefix":"10.1007","volume":"13","author":[{"given":"Hangbae","family":"Chang","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,15]]},"reference":[{"issue":"1","key":"9115_CR1","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1023\/B:ELEC.0000045975.59531.08","volume":"5","author":"A. Stubblefield","year":"2005","unstructured":"Stubblefield, A., Rubin, A. D., & Wallach, D. S. (2005). Managing the performance impact of web security. Electronic Commerce Research, 5(1), 99\u2013116.","journal-title":"Electronic Commerce Research"},{"key":"9115_CR2","first-page":"556","volume-title":"Proceedings of the 7th international conference on web engineering","author":"F. Ganna","year":"2007","unstructured":"Ganna, F. (2007). Service level agreements: web services and security. In Proceedings of the 7th international conference on web engineering (pp. 556\u2013562)."},{"key":"9115_CR3","first-page":"556","volume-title":"Proc. of the 7th international conference on web engineering","author":"G. Frankova","year":"2007","unstructured":"Frankova, G. (2007). Service level agreements: web services and security. In Proc. of the 7th international conference on web engineering (Vol.\u00a04607, pp. 556\u2013562)."},{"issue":"3","key":"9115_CR4","first-page":"513","volume":"30","author":"H. Chang","year":"2008","unstructured":"Chang, H., Kwon, H., Kang, J., & Kim, Y. (2008). A case study on intelligent service design in ubiquitous computing. Computing and Informatics, 30(3), 513\u2013529.","journal-title":"Computing and Informatics"},{"issue":"3","key":"9115_CR5","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1007\/s10660-012-9098-4","volume":"12","author":"S. Scarle","year":"2012","unstructured":"Scarle, S., Arnab, S., Dunwell, I., Petridis, P., Protopsaltis, A., & de\u00a0Freitas, S. (2012). E-commerce transactions in a virtual environment: virtual transactions. Electronic Commerce Research, 12(3), 379\u2013407.","journal-title":"Electronic Commerce Research"},{"issue":"1\u20132","key":"9115_CR6","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1023\/B:ELEC.0000009282.06809.c5","volume":"4","author":"S. R\u00f6hrig","year":"2004","unstructured":"R\u00f6hrig, S., & Knorr, K. (2004). Security analysis of electronic business processes. Electronic Commerce Research, 4(1\u20132), 59\u201381.","journal-title":"Electronic Commerce Research"},{"key":"9115_CR7","first-page":"409","volume-title":"Proceedings of the 6th USENIX symposium on networked systems design and implementation","author":"P. Verkaik","year":"2009","unstructured":"Verkaik, P., Agarwal, Y., Gupta, R., & Snoeren, A. C. (2009). Softspeak: making VoIP play well in existing 802.11 deployments. In Proceedings of the 6th USENIX symposium on networked systems design and implementation (pp. 409\u2013422)."},{"issue":"1\u20132","key":"9115_CR8","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1023\/B:ELEC.0000009281.05504.93","volume":"4","author":"V. Franke Kleist","year":"2004","unstructured":"Franke Kleist, V. (2004). A transaction cost model of electronic trust: transactional return, incentives for network security and optimal risk in the digital economy. Electronic Commerce Research, 4(1\u20132), 41\u201357.","journal-title":"Electronic Commerce Research"},{"key":"9115_CR9","first-page":"271","volume-title":"Covert channel for improving VoIP security, advances in information processing and protection, part II","author":"W. Mazurczyk","year":"2008","unstructured":"Mazurczyk, W., & Kotulski, Z. (2008). In Covert channel for improving VoIP security, advances in information processing and protection, part II (pp. 271\u2013280)."},{"key":"9115_CR10","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-3-642-23993-9_9","volume":"231","author":"X. Liu","year":"2011","unstructured":"Liu, X., & Tu, C. (2011). Research on security of VoIP network. Communications in Computer and Information Science, 231, 59\u201365.","journal-title":"Communications in Computer and Information Science"},{"key":"9115_CR11","series-title":"Lecture notes in electrical engineering","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/978-94-007-4516-2_42","volume-title":"Study on development of appraisal business performance indicator","author":"Y. Kim","year":"2012","unstructured":"Kim, Y., Kang, J., Na, Y., & Chang, H. (2012) In Lecture notes in electrical engineering: Vol.\u00a0164. Study on development of appraisal business performance indicator (pp. 417\u2013423)."}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-013-9115-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10660-013-9115-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-013-9115-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T20:52:53Z","timestamp":1559249573000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10660-013-9115-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,15]]},"references-count":11,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,9]]}},"alternative-id":["9115"],"URL":"https:\/\/doi.org\/10.1007\/s10660-013-9115-2","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"value":"1389-5753","type":"print"},{"value":"1572-9362","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,5,15]]}}}