{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T16:52:50Z","timestamp":1673715170916},"reference-count":0,"publisher":"Walter de Gruyter GmbH","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6,28]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Today's Web applications are often compositions of distributed yet interconnected services that offer features and data through defined interfaces via standardized protocols.\nProviding a set of best practices for organizing and utilizing distributed capabilities, the service-oriented architecture design pattern largely contributed to this trend.\nTo react on emerging customer requirements, using agile methodology for Web application development fits well in this context.\nWhile it allows promptly responding to change by adjusting the Web application architecture, security must be applied as a holistic approach throughout the entire Web application's lifecycle.\nThere is a need for a flexible, expressive and easy-to-use way to model a Web application's architecture with a strong emphasis on security.\nThis article discusses our work on extending the WebComposition Architecture Model towards a semantically enriched description of a Web application's architecture.\nFor enabling systematic exploitation of such architecture descriptions, we utilize W3C's WebID identity mechanism, the WAC authorization method, and fine-grained filters.\nWe explain how WebID can be applied to allow Web services to mutually\n            authenticate and exchange data, e.\u202fg., interface definitions and service parameters, in a controlled way.<\/jats:p>","DOI":"10.1515\/itit-2013-1031","type":"journal-article","created":{"date-parts":[[2014,5,27]],"date-time":"2014-05-27T12:06:20Z","timestamp":1401192380000},"page":"112-118","source":"Crossref","is-referenced-by-count":2,"title":["Utilizing architecture models for secure distributed web applications and services"],"prefix":"10.1515","volume":"56","author":[{"given":"Stefan","family":"Wild","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Chemnitz"}]},{"given":"Martin","family":"Gaedke","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Chemnitz"}]}],"member":"374","published-online":{"date-parts":[[2014,5,31]]},"container-title":["it - Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/itit-2013-1031\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/itit-2013-1031\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T11:43:16Z","timestamp":1624448596000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/itit-2013-1031\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,31]]},"references-count":0,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2014,5,31]]},"published-print":{"date-parts":[[2014,6,28]]}},"alternative-id":["10.1515\/itit-2013-1031"],"URL":"https:\/\/doi.org\/10.1515\/itit-2013-1031","relation":{},"ISSN":["2196-7032","1611-2776"],"issn-type":[{"value":"2196-7032","type":"electronic"},{"value":"1611-2776","type":"print"}],"subject":[],"published":{"date-parts":[[2014,5,31]]}}}