{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T21:28:46Z","timestamp":1649194126595},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2012,4,1]],"date-time":"2012-04-01T00:00:00Z","timestamp":1333238400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2012,4]]},"DOI":"10.1007\/s11623-012-0091-9","type":"journal-article","created":{"date-parts":[[2012,4,17]],"date-time":"2012-04-17T04:49:18Z","timestamp":1334638158000},"page":"236-240","source":"Crossref","is-referenced-by-count":0,"title":["XML Signature Wrapping Angriffe wirksam unterbinden"],"prefix":"10.1007","volume":"36","author":[{"given":"Meiko","family":"Jensen","sequence":"first","affiliation":[]},{"given":"Holger","family":"Junker","sequence":"additional","affiliation":[]},{"given":"Luigi Lo","family":"Iacono","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Mainka","sequence":"additional","affiliation":[]},{"given":"J\u00f6rg","family":"Schwenk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,4,18]]},"reference":[{"key":"91_CR1","unstructured":"Die Beauftragte der Bundesregierung f\u00fcr Informationstechnik: SAGA, http:\/\/www.cio.bund.de\/DE\/Architekturen-und-Standards\/SAGA\/saga_node.html"},{"key":"91_CR2","unstructured":"Die Beauftragte der Bundesregierung f\u00fcr Informationstechnik: Leitfaden Plattformunabh\u00e4ngigkeit, http:\/\/www.cio.bund.de\/SharedDocs\/Publikationen\/DE\/Architekturen-und-Standards\/leitfaden_plattformunabhaengigkeit_Stand_2007_download.html"},{"key":"91_CR3","unstructured":"BA: SOA und ROBASO, http:\/\/www.arbeitsagentur.de\/nn_380894\/Dienststellen\/besondere-Dst\/ITSYS\/IT-Themen-und-Projekte\/SOAROBASO.html"},{"key":"91_CR4","unstructured":"BIT: Register Factory White Paper, http:\/\/www.bva.bund.de\/DE\/Aufgaben\/Abt__I\/RegisterFactory\/Publikationen\/Dokumente\/Whitepaper__Register__Factory,templateId=raw,property=publicationFile.pdf\/Whitepaper_Register_Factory.pdf"},{"key":"91_CR5","unstructured":"Die Beauftragte der Bundesregierung f\u00fcr Informationstechnik: IT-Dienstleistungszentren des Bundes, http:\/\/www.cio.bund.de\/DE\/IT-Angebot\/IT-Dienstleistungszentren\/dienstleistungszentren_node.html"},{"key":"91_CR6","doi-asserted-by":"crossref","unstructured":"T. Jager, J. Somorovsky: How To Break XML Encryption. 18th ACM Conference on Computer and Communications Security (CCS), 2011","DOI":"10.1145\/2046707.2046756"},{"key":"91_CR7","doi-asserted-by":"crossref","unstructured":"J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, L. Lo Iacono: All Your Clouds Are Belong to Us \u2014 Security Analysis of Cloud Management Interfaces. ACM Cloud Computing Security Workshop (CCSW), 2011","DOI":"10.1145\/2046660.2046664"},{"issue":"9","key":"91_CR8","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1007\/s11623-009-0142-z","volume":"33","author":"Nils Gruschka","year":"2009","unstructured":"N. Gruschka, M. Jensen, L. Lo Iacono, J. Schwenk: XML Signature Wrapping Angriffe, DuD, 9\/2009, Seiten 553\u2013560, 2009","journal-title":"Datenschutz und Datensicherheit - DuD"},{"key":"91_CR9","doi-asserted-by":"crossref","unstructured":"N. Gruschka, L. Lo Iacono: Vulnerable Cloud: SOAP Message Security Validation Revisited, IEEE International Conference on Web Services (ICWS), 2009","DOI":"10.1109\/ICWS.2009.70"},{"key":"91_CR10","doi-asserted-by":"crossref","unstructured":"K. Bhargavan, C. Fournet, A. D. Gordon, G. O\u2019shea: An advisor for Web Services Security policies, Workshop on Secure Web Services (SWS), 2005","DOI":"10.1145\/1103022.1103024"},{"key":"91_CR11","doi-asserted-by":"crossref","unstructured":"M. A. Rahaman, A. Schaad, M. Rits: Towards secure SOAP message exchange in a SOA, Workshop on Secure Web Services (SWS), 2006","DOI":"10.1145\/1180367.1180382"},{"key":"91_CR12","doi-asserted-by":"crossref","unstructured":"S. Gajek, L. Liao, J. Schwenk: Breaking and fixing the inline approach, Workshop on Secure Web Services (SWS), 2007","DOI":"10.1145\/1314418.1314425"},{"key":"91_CR13","doi-asserted-by":"crossref","unstructured":"S. Gajek, M. Jensen, L. Liao, J. Schwenk: Analysis of signature wrapping attacks and countermeasures, IEEE International Conference on Web Services (ICWS), 2009","DOI":"10.1109\/ICWS.2009.12"},{"key":"91_CR14","doi-asserted-by":"crossref","unstructured":"M. Jensen, L. Liao, J. Schwenk: The curse of namespaces in the domain of xml signature. Workshop on Secure Web Services (SWS), 2009.","DOI":"10.1145\/1655121.1655129"},{"key":"91_CR15","doi-asserted-by":"crossref","unstructured":"M. Jensen, C, Meyer, J. Somorovsky, J. Schwenk: On the effectiveness of xml schema validation for countering xml signature wrapping attacks. First International Workshop on Securing Services on the Cloud (IWSSC), 2011.","DOI":"10.1109\/IWSSCloud.2011.6049019"},{"key":"91_CR16","doi-asserted-by":"crossref","unstructured":"McIntosh, Michael; Austel, Paula: XML Signature Element Wrapping Attacks and Countermeasures, IBM Research Report, RC23691, August 9, 2005.","DOI":"10.1145\/1103022.1103026"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0091-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-012-0091-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0091-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0091-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,27]],"date-time":"2019-06-27T11:18:05Z","timestamp":1561634285000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-012-0091-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4]]},"references-count":16,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,4]]}},"alternative-id":["91"],"URL":"https:\/\/doi.org\/10.1007\/s11623-012-0091-9","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,4]]}}}