{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T07:03:51Z","timestamp":1648537431980},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2007,9,1]],"date-time":"2007-09-01T00:00:00Z","timestamp":1188604800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1007\/s11623-007-0218-6","type":"journal-article","created":{"date-parts":[[2007,9,25]],"date-time":"2007-09-25T22:57:22Z","timestamp":1190761042000},"page":"656-661","source":"Crossref","is-referenced-by-count":1,"title":["SOA und Sicherheit"],"prefix":"10.1007","volume":"31","author":[{"given":"Claudia","family":"Eckert","sequence":"first","affiliation":[]},{"given":"Bj\u00f6rn","family":"Steinemann","sequence":"additional","affiliation":[]},{"given":"Tobias","family":"Wahl","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"218_CR1","unstructured":"Apache Axis, http:\/\/ws.apache.org\/axis\/"},{"key":"218_CR2","unstructured":"Apache Axis2, http:\/\/ws.apache.org\/axis2\/"},{"key":"218_CR3","doi-asserted-by":"crossref","unstructured":"C. Eckert, IT-Sicherheit, Oldenbourg-Verlag, 2006","DOI":"10.1524\/9783486595970"},{"key":"218_CR4","unstructured":"GlassFish Java Application Server, https:\/\/glassfish.dev.java.net\/"},{"key":"218_CR5","unstructured":"NetBeans IDE, http:\/\/www.netbeans.org\/"},{"key":"218_CR6","unstructured":"Apache Rampart, http:\/\/ws.apache.org\/axis2\/modules\/rampart\/1_2\/securitymodule.html"},{"key":"218_CR7","doi-asserted-by":"crossref","unstructured":"M. Raepple, Web Services Sicherheit \u2014 Neue Standards erweitern das Sicherheitsmodell f\u00fcr Web Services, DuD, September 2007","DOI":"10.1007\/s11623-007-0216-8"},{"key":"218_CR8","unstructured":"Web Service Security \u2014 Best Practice Guide, M\u00e4rz 2007, http:\/\/www.secologic.de"},{"key":"218_CR9","unstructured":"World Wide Web Consortium (W3C), SOAP Version 1.2, http:\/\/www.w3.org\/TR\/"},{"key":"218_CR10","unstructured":"BEA Systems Inc. et al, Web Services Federation Language (WS-Federation), Dezember 2006, http:\/\/specs.xmlsoap.org\/ws\/2006\/12\/federation\/ws-federation.pdf"},{"key":"218_CR11","unstructured":"World Wide Web Consortium, Web Services Policy 1.5 \u2014 Framework, Juli 2007, http:\/\/www.w3.org\/TR\/PR-wspolicy-20070706"},{"key":"218_CR12","unstructured":"World Wide Web Consortium, Web Services Policy 1.5 \u2014 Attachment, Juli 2007, http:\/\/www.w3.org\/TR\/PR-wspolicy-attach-20070706"},{"key":"218_CR13","unstructured":"OASIS, WS-SecureCon-versation 1.3, M\u00e4rz 07, http:\/\/docs.oasis-open.org\/ws-sx\/ws-secureconversation\/200512\/ws-secureconversation-1.3-os.pdf"},{"key":"218_CR14","unstructured":"OASIS, Web Services Security Policy Languages (WS-SecurityPolicy) Version 1.2, April 2007, http:\/\/docs.oasisopen.org\/ws-sx\/wssecuritypolicy\/vl.2\/ws-securitypolicy.pdf"},{"key":"218_CR15","unstructured":"Project Tango, Web Services Interoperability Technologies (WSIT), https:\/\/wsit.dev.java.net\/"},{"key":"218_CR16","unstructured":"OASIS, Web Services Security: SOAP Message Security 1.1, Feb. 2006, http:\/\/docs.oasis-open.org\/wss\/vl.1\/wssvl.1-spec-os-SOAPMessageSecurity.pdf"},{"key":"218_CR17","unstructured":"Apache WSS4J, http:\/\/ws.apache.org\/wss4j\/"},{"key":"218_CR18","doi-asserted-by":"crossref","unstructured":"IBM und Microsoft, Security in a Web Services World: A Proposed Architecture and Roadmap, April 2002, http:\/\/msdn2.microsoft.com\/enus\/library\/ms977312.aspx","DOI":"10.1016\/S1353-4858(02)00404-X"},{"key":"218_CR19","unstructured":"OASIS, WS-Trust 1.3, M\u00e4rz 2007, http:\/\/docs.oasis-open.org\/ws-sx\/ws-trust\/200512\/ws-trust-1.3-os.pdf"},{"key":"218_CR20","unstructured":"World Wide Web Con-sortium (W3C), XML Encryption Syntax and Processing, http:\/\/www.w3.org\/TR\/xmlenc-core\/"},{"key":"218_CR21","unstructured":"World Wide Web Con-sortium (W3C), XML-Signature Syntax and Processing, http:\/\/www.w3.org\/TR\/xmldsigcore\/"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-007-0218-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-007-0218-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-007-0218-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:08:25Z","timestamp":1559412505000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-007-0218-6"}},"subtitle":["Web Service Security Praxis und Offene Probleme"],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":21,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2007,9]]}},"alternative-id":["218"],"URL":"https:\/\/doi.org\/10.1007\/s11623-007-0218-6","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,9]]}}}