{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:34:00Z","timestamp":1743078840239},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/icws.2004.1314745","type":"proceedings-article","created":{"date-parts":[[2004,11,12]],"date-time":"2004-11-12T19:14:14Z","timestamp":1100286854000},"page":"244-251","source":"Crossref","is-referenced-by-count":33,"title":["Best-practice patterns and tool support for configuring secure Web services messaging"],"prefix":"10.1109","author":[{"given":"M.","family":"Tatsubori","sequence":"first","affiliation":[]},{"given":"T.","family":"Imamura","sequence":"additional","affiliation":[]},{"given":"Y.","family":"Nakamura","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"BPML 101 Implementing the BPML Specification","year":"2001","author":"baker","key":"19"},{"journal-title":"Basic Security Profile 1 1 - Working Group Draft","article-title":"WS-I security scenarios","year":"2004","key":"17"},{"journal-title":"Model Driven Architecture","year":"2003","author":"frankel","key":"18"},{"key":"15","article-title":"Architectural Patterns for Enabling Application Security","author":"yoder","year":"0","journal-title":"PLoP '97"},{"key":"16","article-title":"Tropyc: A pattern language for cryptographic software","author":"braga","year":"0","journal-title":"PLoP '98"},{"journal-title":"OASIS WSS TC Working Draft","article-title":"Web Services Security: UsernameToken Profile","year":"2003","key":"13"},{"journal-title":"OASIS WSS TC Working Draft","article-title":"Web Services Security: X.509 Certificate Token Profile","year":"2003","key":"14"},{"journal-title":"Secrets and Lies Digital Security in a Networked World","year":"2001","author":"schneier","key":"11"},{"journal-title":"OASIS WSS TC Working Draft","year":"2003","key":"12"},{"journal-title":"Extensible Markup Language (XML) 1 0 W3C Recommendation Oct 6","year":"2000","key":"3"},{"journal-title":"Business Process Management Initiative","year":"2001","key":"20"},{"key":"2","article-title":"Patterns for securing web services messaging","author":"imamura","year":"2003","journal-title":"OPSLA Workshop on Web Services and Service Oriented Architecture Best Practice and Patterns 2003"},{"journal-title":"Security in a Web Services World A Proposed Architecture and Roadmap","year":"2002","key":"1"},{"journal-title":"Web Services Federation Language","year":"2003","key":"10"},{"journal-title":"Web Services Trust Language Draft","year":"2002","key":"7"},{"journal-title":"Web Services Security Policy Language (WS-SecurityPolicy)","year":"2002","key":"6"},{"journal-title":"Web Services Policy Framework (WS-Policy)","year":"2003","key":"5"},{"journal-title":"SOAP Version 1 2 W3C Recommendation June","year":"2003","key":"4"},{"journal-title":"Web Services Description Language (WSDL) 1 1 W3C Recommendation","year":"2001","key":"9"},{"journal-title":"Web Services Secure Conversation Draft","year":"2002","key":"8"}],"event":{"name":"Proceedings. IEEE International Conference on Web Services, 2004.","start":{"date-parts":[[2004,7,9]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2004,7,9]]}},"container-title":["Proceedings. IEEE International Conference on Web Services, 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9185\/29136\/01314745.pdf?arnumber=1314745","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T00:28:23Z","timestamp":1489451303000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1314745\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icws.2004.1314745","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}