{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:05:20Z","timestamp":1725491120052},"publisher-location":"Dordrecht","reference-count":13,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9781402062650"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-1-4020-6266-7_15","type":"book-chapter","created":{"date-parts":[[2007,9,1]],"date-time":"2007-09-01T00:50:43Z","timestamp":1188607843000},"page":"79-84","source":"Crossref","is-referenced-by-count":0,"title":["Developing secure Web-applications \u2013 Security criteria for the development of e-Democracy Web-applications"],"prefix":"10.1007","author":[{"given":"Ant\u00f3nio","family":"Pacheco","sequence":"first","affiliation":[]},{"given":"Carlos","family":"Serr\u00e3o","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Garfinkel, Simson, 2001. Web Security & Commerce, Second Edition, O, Reilly"},{"key":"15_CR2","unstructured":"Scambray, Joel, 2005. Web Applications (Hacking Exposed), McGraw-Hill."},{"key":"15_CR3","unstructured":"World Wide Web security FAQ: http:\/\/www.w3.org\/Security\/Faq\/www-security-faq.html"},{"key":"15_CR4","unstructured":"CERT advisory 97.25.CGI: http:\/\/www.cert.org\/advisories\/CA-1997-25.html"},{"key":"15_CR5","unstructured":"CERT advisory CA-2000-02 http:\/\/www.cert.org\/advisories\/CA-2000-02.html"},{"key":"15_CR6","unstructured":"Secure Programming for Linux and Unix HOWTO (David A. Wheeler): http:\/\/www.dwheeler.com\/secure-programs"},{"key":"15_CR7","unstructured":"Hidden form field vulnerability white papers (InfoSec Labs): http:\/\/www.infoseclabs.com\/mschff\/mschff.htm"},{"key":"15_CR8","unstructured":"Robert D. Atkinson and Jacob Ulevich, Digital Government: The Next Step to Reengineering the Federal Government, Technology & New Economy Project, Progressive Policy Institute, March 2000."},{"key":"15_CR9","unstructured":"A Conceptual Overview, by Harold C. Relyea, and CRS Report RL31088, Electronic Government: Major Proposals and Initiatives, by Harold C. Relyea."},{"key":"15_CR10","unstructured":"Paperwork Reduction Act Reauthorization and Government Information Management Issues, by Harold C. Relyea, for a more comprehensive analysis of PRA."},{"key":"15_CR11","unstructured":"Government Information Technology Management: Past and Future Issues (The Clinger-Cohen Act), by Jeffrey W. Seifert, for a more comprehensive analysis of the Clinger-Cohen Act."},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"John M. Strate, Charles J. Parrish, Charles D. Elder, and Coit Ford, \u201cLife Span Civic Development and Voting Participation,\u201d American Political Science Review, vol. 83","DOI":"10.2307\/1962399"},{"key":"15_CR13","unstructured":"SQUID: http:\/\/www.squid-cache.org"}],"container-title":["Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4020-6266-7_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T01:11:38Z","timestamp":1619658698000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4020-6266-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9781402062650"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-1-4020-6266-7_15","relation":{},"subject":[]}}