{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:58:23Z","timestamp":1730275103879,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/iske.2017.8258785","type":"proceedings-article","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T17:47:01Z","timestamp":1516038421000},"page":"1-4","source":"Crossref","is-referenced-by-count":1,"title":["An application security model based on business process in information system"],"prefix":"10.1109","author":[{"given":"Peng","family":"Xu","sequence":"first","affiliation":[]},{"given":"Meirong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Lifang","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Guanfeng","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Fangli","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Danchen","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"754","article-title":"Modeling and Reasoning About Authentication in Application","volume":"33","author":"zhang","year":"2012","journal-title":"Journal of Chinese Computer Systems"},{"key":"ref11","first-page":"1244","article-title":"Analysis on security objectives of business process elements","volume":"41","author":"zhi-wei","year":"2007","journal-title":"Journal of Zhejiang University"},{"key":"ref12","first-page":"19","volume":"4","author":"sharon","year":"1996","journal-title":"A Business Approach to Effective Information Technology Risk Analysis and Management Information Management & Computer Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1023\/B:ELEC.0000009282.06809.c5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/0954-1810(95)00020-8"},{"key":"ref4","article-title":"Architectural Patterns for Enabling Application Security","author":"yoder","year":"1997","journal-title":"Lllinois PLoP"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.08.283"},{"key":"ref6","first-page":"97","article-title":"etc. A Meta Model for Authorizations in Application Security Systems and their Integration into RBAC Administration","author":"kern","year":"2004","journal-title":"SACMAT'04 USA"},{"journal-title":"Information Technology - Open Systems Interconnection - Basic Reference Model Part 2 Security Architecture","article-title":"ISO\/IEC 7498&#x2013;2: 1996","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCCEE.2017.7866696"},{"key":"ref7","first-page":"44","article-title":"The Research of Web Application Security Testing[J]","author":"hai-yan","year":"2008","journal-title":"Computer Security"},{"key":"ref2","first-page":"121","article-title":"Research on Application-Security Model","volume":"8","author":"zhang","year":"2012","journal-title":"Netinfo Security"},{"journal-title":"Information security technology-Baseline for classified protection of information system security","article-title":"BG-T22239&#x2013;2008","year":"0","key":"ref1"},{"key":"ref9","first-page":"43","article-title":"Research on trust degree of authentication","volume":"38","author":"zhang","year":"2011","journal-title":"Computer Science"}],"event":{"name":"2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","start":{"date-parts":[[2017,11,24]]},"location":"Nanjing","end":{"date-parts":[[2017,11,26]]}},"container-title":["2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8246022\/8258711\/08258785.pdf?arnumber=8258785","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,19]],"date-time":"2018-02-19T18:56:04Z","timestamp":1519066564000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8258785\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/iske.2017.8258785","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}