{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T10:59:24Z","timestamp":1730199564008,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/atnac.2018.8615367","type":"proceedings-article","created":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T00:49:51Z","timestamp":1547772591000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Experiments and Proofs in Web-service Security"],"prefix":"10.1109","author":[{"given":"Dawood","family":"Sheniar","sequence":"first","affiliation":[]},{"given":"Nabeel","family":"Hadaad","sequence":"additional","affiliation":[]},{"given":"David","family":"Martin","sequence":"additional","affiliation":[]},{"given":"Ron","family":"Addie","sequence":"additional","affiliation":[]},{"given":"Shahab","family":"Abdullah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2018.0045"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3205977.3206000"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1145\/3159450.3159511","article-title":"Evaluating two methods for integrating secure programming education","author":"tabassum","year":"2018","journal-title":"Proc of the ACM Technical Symposium on Computer Science Education"},{"article-title":"Systems security engineering: Considerations for a multidisciplinary approach in the engineering of trustworthy secure systems [including updates as of 1-03-2018]","year":"2018","author":"ross","key":"ref13"},{"journal-title":"Principles of Information Security","year":"2011","author":"whitman","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SYSCON.2018.8369491"},{"key":"ref16","volume":"50","author":"bishop","year":"2005","journal-title":"Introduction to Computer Security"},{"key":"ref17","article-title":"How to end password reuse on the web","author":"wang","year":"2018","journal-title":"arXiv preprint arXiv 1805 00566"},{"key":"ref18","article-title":"A guide to the project management body of knowledge (pmbok&#x00AE; guide)-(simplified chinese)","author":"institute","year":"2018","journal-title":"Project Management Institute"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/pmj.21345"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICADIWT.2014.6814685"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/978-3-319-10879-7_13","article-title":"Statistics on password re-use and adaptive strength for financial accounts","author":"bailey","year":"2014","journal-title":"Security and Cryptography for Networks"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDKE.2011.6053929"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MOBISECSERV.2018.8311443"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2018.490"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(18)30034-5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2011.173"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3172869"},{"key":"ref1","first-page":"77","article-title":"User centric identity management","author":"j\u00f8sang","year":"2005","journal-title":"AusCERT Asia Pacific Information Technology Security Conference"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.marpol.2011.05.012"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.4324\/9781315610573","author":"bourne","year":"2016","journal-title":"Stakeholder relationship management a maturity model for organisational implementation"},{"key":"ref21","first-page":"182","article-title":"Stakeholders in security policy development","author":"maynard","year":"2011","journal-title":"Australian Information Security Management Conference"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.5465\/ame.1991.4274682"},{"key":"ref23","article-title":"An analysis of the cloud computing security problem","author":"almorsy","year":"2016","journal-title":"arXiv preprint arXiv 1609 09861"},{"key":"ref25","first-page":"1","article-title":"Information security policy-a development guide for large and small companies","author":"diver","year":"2007","journal-title":"SANS Institute"}],"event":{"name":"2018 28th International Telecommunication Networks and Applications Conference (ITNAC)","start":{"date-parts":[[2018,11,21]]},"location":"Sydney, NSW","end":{"date-parts":[[2018,11,23]]}},"container-title":["2018 28th International Telecommunication Networks and Applications Conference (ITNAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8598648\/8615121\/08615367.pdf?arnumber=8615367","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T23:52:39Z","timestamp":1643241159000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8615367\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/atnac.2018.8615367","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}