{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:22:49Z","timestamp":1729660969919,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/mipro.2015.7160275","type":"proceedings-article","created":{"date-parts":[[2015,7,16]],"date-time":"2015-07-16T18:02:26Z","timestamp":1437069746000},"page":"254-258","source":"Crossref","is-referenced-by-count":0,"title":["Operating system impact on CPU and RAM utilisation when introducing XML security"],"prefix":"10.1109","author":[{"given":"Sasko","family":"Ristov","sequence":"first","affiliation":[]},{"given":"Marjan","family":"Gusev","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TSC.2008.8"},{"key":"ref11","article-title":"Based on the introduction of chaos theory of web server performance","volume":"8","author":"yue-min","year":"2013","journal-title":"Journal of Convergence Information Technology(JCIT)"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/MIC.2003.1167339"},{"key":"ref13","article-title":"Web service performance optimization based on decentralized control mechanisms in cloud computing environment","volume":"7","author":"yu","year":"2013","journal-title":"Int Journal of Digital Content Technology and Its Applications"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1007\/978-3-642-37169-1_21","article-title":"Compute and memory intensive web service performance in the cloud","volume":"207","author":"ristov","year":"0","journal-title":"ICT Innovations 2012"},{"key":"ref15","first-page":"72","article-title":"Performance of web services security","author":"liu","year":"2005","journal-title":"Proceedings of the 13th Annual 13th Mardi Gras Conference"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ICWS.2007.139"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/HASE.2011.69"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/2095536.2095581"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/EDOC.2006.12"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/CLOUD.2013.103"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/IAS.2009.252"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1007\/978-3-319-09879-1_18","article-title":"Modeling the speedup for scalable web services","volume":"311","author":"ristov","year":"0","journal-title":"ICT Innovations 2014"},{"year":"2009","author":"bertino","journal-title":"Security for Web Services and Service-Oriented Architectures","key":"ref3"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1007\/978-3-642-28664-3_34","article-title":"Performance impact correlation of message size vs. concurrent users implementing web service security on linux platform","volume":"150","author":"ristov","year":"2012","journal-title":"ICT Innovations 2011"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.21236\/ADA536681","article-title":"Performance analysis of ws-security mechanisms in soap-based web services","author":"novakouski","year":"2010"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/NWESP.2007.30"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"110","DOI":"10.4156\/jnit.vol4.issue5.11","article-title":"Choosing optimal platform to host web services with xml signature and xml encryption","volume":"4","author":"ristov","year":"2013","journal-title":"JNIT Journal of Next Generation Information Technology"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/PACCS.2009.23"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/ICIW.2008.118"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/EDUCON.2010.5492537"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/SERVICES-1.2008.68"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/MM.2004.54"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/ICWS.2008.102"},{"year":"2013","article-title":"Functional and load testing tool","key":"ref24"},{"year":"2013","article-title":"Jetty web server","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1016\/j.jss.2005.08.006"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/ISPASS.2007.363750"}],"event":{"name":"2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","start":{"date-parts":[[2015,5,25]]},"location":"Opatija, Croatia","end":{"date-parts":[[2015,5,29]]}},"container-title":["2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7153596\/7160221\/07160275.pdf?arnumber=7160275","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,28]],"date-time":"2019-08-28T05:39:08Z","timestamp":1566970748000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7160275\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/mipro.2015.7160275","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}