{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:21:32Z","timestamp":1730222492822,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/fskd.2015.7382287","type":"proceedings-article","created":{"date-parts":[[2016,1,14]],"date-time":"2016-01-14T23:52:33Z","timestamp":1452815553000},"page":"2163-2168","source":"Crossref","is-referenced-by-count":11,"title":["Multi-factor web API security for securing Mobile Cloud"],"prefix":"10.1109","author":[{"given":"Longji","family":"Tang","sequence":"first","affiliation":[]},{"family":"Liubo Ouyang","sequence":"additional","affiliation":[]},{"given":"Wei-Tek","family":"Tsai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Twitter Keeping our users secure","year":"2013","key":"ref33"},{"journal-title":"Mobile Service Infrastructure in book [5]","year":"0","author":"tang","key":"ref32"},{"journal-title":"Modeling and Analyzing Service-Oriented Enterprise Architectural Styles","year":"2011","author":"tang","key":"ref31"},{"key":"ref30","article-title":"API Governance and Management","author":"tang","year":"2013","journal-title":"October 8 2014 Service Technology Magazine"},{"year":"2015","key":"ref36","article-title":"XACML"},{"journal-title":"Wikipedia Security token service (STS)","year":"2013","key":"ref35"},{"journal-title":"WOS 2 API Management Platform","year":"0","key":"ref34"},{"key":"ref10","first-page":"87","article-title":"ACCRA-Based Architecture for Enterprise Mobile Cloud Computing","author":"hu","year":"2013","journal-title":"MS&#x2019; 13 Proceedings of the 2013 IEEE Second International Conference on Mobile Services"},{"journal-title":"IBM Exposing and Managing Enterprise Services with IBM API Management Redbook","year":"2014","key":"ref11"},{"journal-title":"IETF The OAuth 2 0 Authorization Framework","year":"2012","key":"ref12"},{"journal-title":"Internet X 509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profiles","year":"2008","key":"ref13"},{"journal-title":"Juniper Research Cloud-based Mobile Market to Grow 88%","year":"0","key":"ref14"},{"journal-title":"Layer 7 API Management Platform","year":"2015","key":"ref15"},{"journal-title":"Serious security flaw in OAuth OpenID discovered","year":"2014","author":"low","key":"ref16"},{"key":"ref17","volume":"q1","author":"maler","year":"2013","journal-title":"The Forrester Wave&#x2122; API Management Platforms"},{"journal-title":"Mashery API Management Platform","year":"0","key":"ref18"},{"journal-title":"Microsoft API Management Platform","year":"0","key":"ref19"},{"journal-title":"SOA Software API Management Platform","year":"2014","key":"ref28"},{"key":"ref4","article-title":"Mobile Cloud Security Issues and Challenges: A Perspective","volume":"3","author":"cecil donald","year":"2013","journal-title":"International Journal of Engineering and Innovative Technology"},{"journal-title":"Advanced API Security apress","year":"2014","author":"siriwardena","key":"ref27"},{"journal-title":"Apigee API Management Platform","year":"2014","key":"ref3"},{"key":"ref6","article-title":"Mobile cloud computing: A survey","author":"fernando","year":"2012","journal-title":"Future Generation Computer Systems"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-4193-8.ch012"},{"key":"ref5","article-title":"Service Infrastructure: On-Premise and in the Cloud","author":"chappell","year":"2015","journal-title":"The Prentice Hall Service Technology Series from Thomas Erl"},{"journal-title":"Forum Systems API Management Platform","year":"2014","key":"ref8"},{"journal-title":"Architectural Styles and the Design of Network-Based Software Architectures","year":"2000","author":"fielding","key":"ref7"},{"journal-title":"ABI Research Mobile Cloud Computing Reaches $5 2B Market By 2015","year":"0","key":"ref2"},{"journal-title":"Google API Keys","year":"0","key":"ref9"},{"journal-title":"3Scale API Management Platform","year":"2014","key":"ref1"},{"journal-title":"Towards Secure Mobile Cloud Computing A Survey Future Generation Computer Systems","year":"2012","author":"nasir khana","key":"ref20"},{"journal-title":"OWASP Top 10 Security Vulnerabilities","year":"2013","key":"ref22"},{"journal-title":"OpenID Foundation OpebID and OpenID Connect","year":"0","key":"ref21"},{"journal-title":"Parasoft API Integrity How Buggy Are Today's APIs","year":"2013","key":"ref24"},{"journal-title":"PC Connection Overcoming the Security Challenges of the Cloud","year":"2013","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14257\/ijgdc.2013.6.6.04"},{"year":"2013","key":"ref25","article-title":"SAML"}],"event":{"name":"2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)","start":{"date-parts":[[2015,8,15]]},"location":"Zhangjiajie, China","end":{"date-parts":[[2015,8,17]]}},"container-title":["2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7374053\/7381900\/07382287.pdf?arnumber=7382287","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T16:45:10Z","timestamp":1490373910000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7382287\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/fskd.2015.7382287","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}