{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T22:49:10Z","timestamp":1649112550867},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2010,2,24]],"date-time":"2010-02-24T00:00:00Z","timestamp":1266969600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2010,3]]},"DOI":"10.1007\/s11623-010-0022-6","type":"journal-article","created":{"date-parts":[[2010,2,23]],"date-time":"2010-02-23T07:19:05Z","timestamp":1266909545000},"page":"138-142","source":"Crossref","is-referenced-by-count":2,"title":["\u00dcberpr\u00fcfung von Webanwendungen mit dem \u201eOWASP Application Security Verification Standard 2009\u201c"],"prefix":"10.1007","volume":"34","author":[{"given":"Kai","family":"Jendrian","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,2,24]]},"reference":[{"issue":"12","key":"22_CR1","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1007\/s11623-007-0284-9","volume":"31","author":"Rosemaria Giesecke","year":"2007","unstructured":"R. Giesecke, S. F\u00fcnfrocken, Einfach zu mehr Software-Sicherheit, in: DuD 12\/2007, pp. 877\u2013833.","journal-title":"Datenschutz und Datensicherheit - DuD"},{"issue":"10","key":"22_CR2","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1007\/s11623-006-0156-8","volume":"30","author":"Micha Borrmann","year":"2006","unstructured":"M. Borrmann, S. Schreiber, Sicherheit von Web-Applikationen aus Sicht eines Angreifers, in: DuD 10\/2006, pp. 599\u2013603.","journal-title":"Datenschutz und Datensicherheit - DuD"},{"issue":"10","key":"22_CR3","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/s11623-006-0159-5","volume":"30","author":"Markus Schumacher","year":"2006","unstructured":"M. Schumacher, A. Wiegenstein, Sichere Web-Anwendungen, in: DuD 10\/2006, pp. 611\u2013615.","journal-title":"Datenschutz und Datensicherheit - DuD"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Dirk Fox, Open Web Application Security Project, in: DuD 10\/2006, p. 636.","DOI":"10.1007\/s11623-006-0164-8"},{"key":"22_CR5","unstructured":"A. van der Stock, D. Cruz, J. Chapman, D. Lowery, E. Keary, M. Morana, D. Rook, J. Williams, P. Prego, OWASP Code Review Guide, V1.1, \n                    http:\/\/www.owasp.org\/index.php\n                    \n                   Category:OWASP_Code_Review_Project"},{"key":"22_CR6","unstructured":"Matteo Meucci (Project Lead), OWASP Testing Guide, v3, \n                    http:\/\/www.owasp.org\/images\/5\/56\/OWASP_Testing_Guide_v3.pdf"},{"key":"22_CR7","unstructured":"M. Boberski, J. Williams, D. Wichers, OWASP Application Security Verification Standard 2009, \n                    http:\/\/www.owasp.org\/images\/4\/4e\/OWASP_ASVS_2009_Web_App_Std_Release.pdf"},{"key":"22_CR8","unstructured":"P. Hope, B. Walther, Web Security Testing Cookbook, O\u2019Reilly 2008"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-010-0022-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-010-0022-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-010-0022-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-010-0022-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:20:57Z","timestamp":1559413257000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-010-0022-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,2,24]]},"references-count":8,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2010,3]]}},"alternative-id":["22"],"URL":"https:\/\/doi.org\/10.1007\/s11623-010-0022-6","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,2,24]]}}}