{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T19:41:18Z","timestamp":1761939678951,"version":"build-2065373602"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/siit.2005.1563803","type":"proceedings-article","created":{"date-parts":[[2006,1,5]],"date-time":"2006-01-05T14:52:38Z","timestamp":1136472758000},"page":"138-146","source":"Crossref","is-referenced-by-count":11,"title":["Web service security - vulnerabilities and threats within the context of WS-security"],"prefix":"10.1109","author":[{"given":"J.","family":"Holgersson","sequence":"first","affiliation":[]},{"given":"E.","family":"Soderstrom","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"year":"0","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(03)00907-3"},{"key":"15","first-page":"2747","article-title":"Architectures and processes (in Swedish), Serviamprojektet, Project report (part II)","author":"henkel","year":"2005"},{"journal-title":"ROI for Web services remains elusive Computerworld","year":"2002","author":"hoffman","key":"16"},{"journal-title":"Web Services Provider Threat or Opportunity","year":"2003","author":"govern","key":"13"},{"journal-title":"IT Pros improve through integration","year":"2003","author":"greenspan","key":"14"},{"key":"11","first-page":"14","author":"dunn","year":"2003","journal-title":"A Manager's Guide to Web Services EAIJournal"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/S0736-5845(03)00061-9"},{"journal-title":"Understanding Web services XML WSDL SOAP and UDDI","year":"2002","author":"newcomer","key":"21"},{"journal-title":"IBM Dictionary of Computing","year":"1994","key":"20"},{"key":"22","article-title":"Is SSL Enough Protection for Web Services? EAI Journal","author":"o'neill","year":"2002","journal-title":"Available on the Internet"},{"journal-title":"Security in Computing","year":"2003","author":"pfleeger","key":"23"},{"journal-title":"Securing Web Services with WS-Security Demystifying WS-Security WS-Policy SAML XML Signature and XML Encryption","year":"2004","author":"rosenberg","key":"24"},{"key":"25","article-title":"SOAP, Crypto-Gram Newsletter","author":"schneier","year":"2000","journal-title":"Available on the Internet"},{"journal-title":"How XML and web services will change your business PriceWaterhouseCoopers as is 2004-01-08","year":"2003","author":"smolnicki","key":"26"},{"key":"27","first-page":"4","article-title":"Business values, contracts and law (in Swedish), Project report (part I)","author":"so?derstro?m","year":"2005"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016599017660"},{"key":"29","first-page":"27","author":"wong","year":"2002","journal-title":"Success With Web Services EAIJournal"},{"article-title":"Building Security Into a Service Oriented Architecture. ZapThink White Paper. Available on the Internet","year":"2003","author":"bloomberg","key":"3"},{"article-title":"Context & Identity, the Linchpins of Web Services Security. ZapThink White Paper. Available on the Internet","year":"2003","author":"bloomberg","key":"2"},{"journal-title":"Web Service A Technical introduction","year":"2002","author":"deitel","key":"10"},{"article-title":"A Guide to Securing XML and Web Services. ZapThink White Paper. Available on the Internet","year":"2004","author":"bloomberg","key":"1"},{"year":"0","key":"30"},{"year":"0","key":"7"},{"key":"6","article-title":"Web Services Security - An Overview","author":"bums","year":"2001","journal-title":"Available on the Internet"},{"year":"0","key":"32"},{"journal-title":"Network Security The Complete Reference Emeryville","year":"2003","author":"bragg","key":"5"},{"year":"0","key":"31"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1115\/1.859735.paper67"},{"year":"0","key":"9"},{"year":"0","key":"8"}],"event":{"name":"The 4th Conference on Standardization and Innovation in Information Technology, 2005.","location":"Geneva, Switzerland"},"container-title":["The 4th Conference on Standardization and Innovation in Information Technology, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10458\/33186\/01563803.pdf?arnumber=1563803","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T01:48:28Z","timestamp":1489542508000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1563803\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/siit.2005.1563803","relation":{},"subject":[]}}