{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T07:13:57Z","timestamp":1725606837508},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T00:00:00Z","timestamp":1664150400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T00:00:00Z","timestamp":1664150400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,26]]},"DOI":"10.1109\/acit54803.2022.9913170","type":"proceedings-article","created":{"date-parts":[[2022,10,12]],"date-time":"2022-10-12T19:53:28Z","timestamp":1665604408000},"page":"432-436","source":"Crossref","is-referenced-by-count":0,"title":["Information System for the Work of Scientific Councils with the Possibility of Voting"],"prefix":"10.1109","author":[{"given":"Oleksii","family":"Bilyk","sequence":"first","affiliation":[{"name":"National University of Kiev,Taras Shevchenko,Kyiv,Ukraine"}]},{"given":"Iryna","family":"Vergunova","sequence":"additional","affiliation":[{"name":"National University of Kiev,Taras Shevchenko,Kyiv,Ukraine"}]}],"member":"263","reference":[{"year":"0","key":"ref10","article-title":"SAP Help Portal"},{"journal-title":"Information Security Theory and Practice","year":"2008","author":"patel","key":"ref11"},{"year":"2018","key":"ref12","article-title":"Java Template Engines, Topstone Software Consulting"},{"year":"2020","key":"ref13","article-title":"Aspose Template Engine demo"},{"year":"0","key":"ref14","article-title":"Thymeleaf official documentation"},{"journal-title":"Docx4j &#x2013; Getting Started","year":"2021","key":"ref15"},{"year":"2020","key":"ref4","article-title":"Introduction to JSON Web Tokens"},{"year":"2016","key":"ref3","article-title":"Learn about token based authentication and how to easily implement JWT in your applications"},{"journal-title":"Access Tokens","year":"2021","key":"ref6"},{"article-title":"JWT Handbook","year":"2016","author":"peyrott","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6455"},{"journal-title":"Refresh Token","year":"2021","key":"ref7"},{"year":"2021","key":"ref2","article-title":"Megapolis.DotNet electronic document management system"},{"year":"2020","key":"ref1","article-title":"Intecracy Group presents the latest video meeting system"},{"key":"ref9","article-title":"Sovremenn&#x00FD;j uchebnik JavaScript. P. 2","author":"kantor","year":"2015","journal-title":"Brauzer dokument sob&#x00FD;tiya interfejsy Internet-izdanie"}],"event":{"name":"2022 12th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2022,9,26]]},"location":"Ruzomberok, Slovakia","end":{"date-parts":[[2022,9,28]]}},"container-title":["2022 12th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9912736\/9912739\/09913170.pdf?arnumber=9913170","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T01:30:47Z","timestamp":1667525447000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9913170\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,26]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/acit54803.2022.9913170","relation":{},"subject":[],"published":{"date-parts":[[2022,9,26]]}}}