{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:28:22Z","timestamp":1729668502775,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,4]]},"DOI":"10.1109\/cscwd.2008.4537075","type":"proceedings-article","created":{"date-parts":[[2010,12,13]],"date-time":"2010-12-13T16:00:45Z","timestamp":1292256045000},"page":"765-770","source":"Crossref","is-referenced-by-count":0,"title":["XML and web services security"],"prefix":"10.1109","author":[{"family":"Lili Sun","sequence":"first","affiliation":[]},{"family":"Yan Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"981","article-title":"xml undeniable signature","author":"sun","year":"2005","journal-title":"Proceedings of International Conference on Computational Intelligence for Modeling Control and Automation"},{"journal-title":"WWW Security","year":"1999","key":"15"},{"journal-title":"An Introduction to XML Digital Signature","year":"0","author":"simon","key":"16"},{"journal-title":"Securing Web Services with WS-Security Demystifying WS-Security WS-Policy SAML XML Signature and XML Encryption","year":"2004","author":"jothy","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1193234"},{"journal-title":"Secure electronic commerce Building the Infrastructure for Digital Signatures & Encryption","year":"1997","author":"ford","key":"11"},{"year":"0","key":"12"},{"volume":"10","year":"2002","key":"3"},{"year":"2002","key":"2"},{"journal-title":"XML Key Management Specification 2 0(XKMS)","year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/764792.764806"},{"journal-title":"Simple Object Access Protocol (SOAP) 1 1 World Wide Web Consortium (W3C)","year":"2000","author":"box","key":"7"},{"journal-title":"Security Assertion Markup Language (SAML) 2 0 Technical Overview 20 Feburary","year":"2005","key":"6"},{"year":"0","key":"5"},{"journal-title":"Web Services Security SOAP Message Security 1 0 (WS-Security 2004)","year":"0","key":"4"},{"key":"9","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1007\/0-387-34805-0_20","article-title":"undeniable signatures","author":"chaum","year":"1990","journal-title":"Advances in Cryptology - Crypto89 volume 435 of Lectures Notes in Computer Science"},{"year":"0","key":"8"}],"event":{"name":"in Design (CSCWD)","start":{"date-parts":[[2008,4,16]]},"location":"Xian, China","end":{"date-parts":[[2008,4,18]]}},"container-title":["2008 12th International Conference on Computer Supported Cooperative Work in Design"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4530852\/4536938\/04537075.pdf?arnumber=4537075","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T13:11:33Z","timestamp":1497877893000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4537075\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/cscwd.2008.4537075","relation":{},"subject":[],"published":{"date-parts":[[2008,4]]}}}