{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T19:49:07Z","timestamp":1649015347653},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2006,10,1]],"date-time":"2006-10-01T00:00:00Z","timestamp":1159660800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2006,10]]},"DOI":"10.1007\/s11623-006-0156-8","type":"journal-article","created":{"date-parts":[[2006,11,3]],"date-time":"2006-11-03T03:16:27Z","timestamp":1162523787000},"page":"599-603","source":"Crossref","is-referenced-by-count":1,"title":["Sicherheit von Web-Applikationen aus Sicht eines Angreifers"],"prefix":"10.1007","volume":"30","author":[{"given":"Micha","family":"Borrmann","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"Schreiber","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,10,1]]},"reference":[{"key":"156_CR1","unstructured":"Dirk Heringhaus: No more secrets? T-Com machts m\u00f6glich! (Datenschleuder #83, Juli 2004, S. 16)"},{"key":"156_CR2","unstructured":"Gartner RAS Core Research Note G00136839: Management Update: Predicts 2006: Collaboration Comes of Age (07.12.2005)"},{"key":"156_CR3","unstructured":"Paul Mutton: PayPal Security Flaw allows Identity Theft (16.06.2006) http:\/\/news.netcraft.com\/archives\/2006\/06\/16\/paypal_security_flaw_allows_identity_theft.html"},{"key":"156_CR4","doi-asserted-by":"crossref","unstructured":"Tim Berners-Lee: Hypertext Transfer Protocol \u2014 HTTP\/1.0 (Mai 1996)","DOI":"10.17487\/rfc1945"},{"key":"156_CR5","unstructured":"Ute Roos, Christoph Puppe: L\u00f6chersuche: All-Purpose-Schwachstellen-Scanner im Test (iX 9\/2005, S. 84)"},{"key":"156_CR6","unstructured":"Christoph Wille: SQL Injection (30.10.2001) http:\/\/www.aspheute.com\/artikel\/20011030.htm"},{"key":"156_CR7","unstructured":"Kevin Spett: SQL Injection (Atlanta 2002) http:\/\/www.spidynamics.com\/support\/whitepapers\/WhitepaperSQLInjection.pdf"},{"key":"156_CR8","unstructured":"OWASP: Top Ten security issues of web applications http:\/\/www.owasp.org\/index.php\/OWASP_Top_Ten_Project"},{"key":"156_CR9","unstructured":"Katrin Heinrich: Sicherheitstests f\u00fcr Web-Applikationen, Diplomarbeit, Hochschule Reutlingen (20.01.2006)"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-006-0156-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-006-0156-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-006-0156-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:08:19Z","timestamp":1559412499000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-006-0156-8"}},"subtitle":["Tatwerkzeug: Web-Browser"],"short-title":[],"issued":{"date-parts":[[2006,10]]},"references-count":9,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2006,10]]}},"alternative-id":["156"],"URL":"https:\/\/doi.org\/10.1007\/s11623-006-0156-8","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,10]]}}}