{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T19:50:18Z","timestamp":1725393018644},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/icws.2004.1314789","type":"proceedings-article","created":{"date-parts":[[2004,11,13]],"date-time":"2004-11-13T00:14:14Z","timestamp":1100304854000},"page":"614-621","source":"Crossref","is-referenced-by-count":9,"title":["Web service authorization framework"],"prefix":"10.1109","author":[{"given":"T.","family":"Ziebermayr","sequence":"first","affiliation":[]},{"given":"S.","family":"Probst","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"SOAP Version 1 2 Part 1","year":"2003","key":"19"},{"journal-title":"The Essentials of Filters","year":"2004","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1023\/B:ELEC.0000009285.50078.b2"},{"journal-title":"Java 2 Platform Enterprise Edition (J2EE)","year":"2004","key":"15"},{"journal-title":"Java Servlet Technologie","year":"2004","key":"16"},{"journal-title":"XACML implementation","year":"2004","key":"13"},{"journal-title":"Enterprise Java Beans Technologie","year":"2004","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/234313.234412"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/764792.764799"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1109\/CSAC.1999.816038","article-title":"User authentication and authorization in the java platform","author":"lai","year":"1999","journal-title":"Proc Annual Computer Security Applications Conf"},{"journal-title":"Web service architecture requirements","year":"2004","key":"20"},{"journal-title":"Web Services-Axis","year":"2003","key":"2"},{"journal-title":"XML Data Management Native XML and XML-Enabled Database Systems","year":"2003","author":"chaudhri","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344301"},{"journal-title":"Jiffy Software XACML Implementation","year":"2003","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/288408.288443"},{"journal-title":"NET Framework","article-title":"CORE security technologies: Security in the microsoft\ufffd","year":"0","key":"5"},{"journal-title":"The J2EE Tutorial","year":"2002","author":"jendrock","key":"4"},{"year":"0","key":"9"},{"journal-title":"OASIS Extensible Access Control Markup Language (XACML) Version 1 1","year":"2003","key":"8"}],"event":{"name":"Proceedings. IEEE International Conference on Web Services, 2004.","start":{"date-parts":[[2004,7,9]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2004,7,9]]}},"container-title":["Proceedings. IEEE International Conference on Web Services, 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9185\/29136\/01314789.pdf?arnumber=1314789","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,4]],"date-time":"2020-04-04T01:44:54Z","timestamp":1585964694000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1314789\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icws.2004.1314789","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}