{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:39:35Z","timestamp":1725457175135},"publisher-location":"Boston, MA","reference-count":16,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780792375142"},{"type":"electronic","value":"9780306470080"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/0-306-47008-x_14","type":"book-chapter","created":{"date-parts":[[2005,12,12]],"date-time":"2005-12-12T13:28:25Z","timestamp":1134394105000},"page":"149-160","source":"Crossref","is-referenced-by-count":0,"title":["Wrappers \u2013 A Mechanism to Support State-Based Authorization in Web Applications"],"prefix":"10.1007","author":[{"given":"Martin S","family":"Olivier","sequence":"first","affiliation":[]},{"given":"Ehud","family":"Gudes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"V Atluri and WK Huang, \u201cAn extended petri net model for supporting workflow in a multilevel secure environment,\u201d in P Samarati and RS Sandhu, Database Security X: Status and Prospects, Chapman & Hall, 1997, pp. 240\u2013258.","DOI":"10.1007\/978-0-387-35167-4_15"},{"key":"14_CR2","unstructured":"J Biskup and C Eckert, \u201cAbout the Enforcement of State Dependent Security Specifications,\u201d in TF Keefe and CE Landwehr (eds), Database Security VII, Elsevier, 1994, 3\u201317"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"F Casati, S Ceri, B Pernici, G Pozz, \u201cConceptual Modelling of Workflows\u201d Proc. of the Object-oriented and Entity-Relationship Conf., Australia, 1995.","DOI":"10.1007\/BFb0020545"},{"key":"14_CR4","unstructured":"CERT, Buffer Overflow in MIME-aware Mail and News Clients, CERT Advisory CA-98.10"},{"key":"14_CR5","unstructured":"W Ford and MS Baum, Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption, Prentice Hall, 1997"},{"key":"14_CR6","unstructured":"SA Demurjian, TC Ting and M Saba, \u201cAgent approaches to enforce Role-based security in distributed and web-based computing,\u201d Proceedings IFIP WG 11.3 Workshop on Database Security, Seattle, Washington, 1999, pp. 65\u201377."},{"issue":"4","key":"14_CR7","doi-asserted-by":"crossref","first-page":"287","DOI":"10.3233\/JCS-1999-7403","volume":"7","author":"E. Gudes","year":"1999","unstructured":"E Gudes, MS Olivier and RP van de Riet, \u201cModelling, Specifying and implementing workflow security in Cyberspace\u201d, Journal of Computer Security, Journal of Computer Security, 7,4, 287\u2013315, 1999","journal-title":"Journal of Computer Security"},{"key":"14_CR8","unstructured":"R Fielding, J Gettys, J Mogul, H Frystyk, L Masinter, P Leach, T Berners-Lee, Hypertext Transfer Protocol \u2014 HTTP\/1.1. RFC 2616, Internet Society"},{"key":"14_CR9","unstructured":"S Garfinkel and G Spafford, Practical Unix & Internet Security, 2nd ed, O\u2019Reilly, 1996"},{"key":"14_CR10","unstructured":"D Harel and M Politi, Modeling Reactive Systems with Statecharts: the STATEMATE Approach, McGraw-Hill, 1998"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"CD McCollum, DB Faatz, WR Herndon, EJ Sebes, RK Thomas, \u201cDistributed object technologies databases and security\u201d, proceedings IFIP WG 11.3 Workshop on Database Security, Lake Tahoe, Ca. 1997, pp. 17\u201333.","DOI":"10.1007\/978-0-387-35285-5_2"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"MS Olivier, RP van de Riet and E Gudes \u201cSpecifying Application-level Security in Workflow Systems,\u201d in R Wagner (ed), Proceedings of the Ninth International Workshop on Security of Data Intensive Applications (DEXA 98), 346\u2013351, IEEE, 1998","DOI":"10.1109\/DEXA.1998.707423"},{"key":"14_CR13","unstructured":"J Park, R Sandhu and S Ghanta, \u201cRBAC on the Web by secure cookies,\u201d Proceedings IFIP WG 11.3 Workshop on Database Security, Seattle, Washington, 1999, pp. 41\u201354."},{"key":"14_CR14","unstructured":"LD Stein, Web Security: A Step-by-Step Reference Guide, Addison-Wesley, 1998"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Z Tari, \u201cDesigning security agents for the DOK federated system,\u201d Proceedings IFIP WG 11.3 Workshop on Database Security, Lake Tahoe, Ca. 1997, pp. 35\u201359","DOI":"10.1007\/978-0-387-35285-5_3"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"G Wiederhold, M Billelo and C Donahue, \u201cWeb implementation of a security mediator for medical databases,\u201d Proceedings IFIP WG 11.3 Workshop on Database Security, Lake Tahoe, Ca. 1997, pp. 60\u201372.","DOI":"10.1007\/978-0-387-35285-5_4"}],"container-title":["IFIP International Federation for Information Processing","Data and Application Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-306-47008-X_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T10:26:25Z","timestamp":1586600785000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-306-47008-X_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9780792375142","9780306470080"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/0-306-47008-x_14","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2002]]}}}