{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:50:37Z","timestamp":1730238637265,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,11]]},"DOI":"10.1109\/icdim.2008.4746824","type":"proceedings-article","created":{"date-parts":[[2009,1,16]],"date-time":"2009-01-16T10:29:46Z","timestamp":1232101786000},"page":"75-80","source":"Crossref","is-referenced-by-count":3,"title":["An authorization model for Web Services within SOA"],"prefix":"10.1109","author":[{"given":"Hany F. EL","family":"Yamany","sequence":"first","affiliation":[]},{"given":"Miriam A. M.","family":"Capretz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"End-to-End Security for Web Services and Services Oriented Architectures","year":"0","author":"sedukhin","key":"3"},{"journal-title":"Service-Oriented Architecture - Concepts Technology and Design","year":"2005","author":"erl","key":"2"},{"key":"10","first-page":"74","article-title":"an attribute-based access control model for web services","author":"hai-bo","year":"2006","journal-title":"proceedings of the Seventh International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'06)"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.23"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.2.1.27-38"},{"journal-title":"Data Mining with SQL Server 2005","year":"2005","author":"zhao","key":"6"},{"year":"0","key":"5"},{"key":"4","article-title":"use of data mining to enhance security for soa","author":"hany","year":"2008","journal-title":"proceedings of the IEEE International Conference on Convergence and hybrid Information Technology (ICCIT"},{"key":"9","first-page":"1302","article-title":"an attribute and role based access control model for web services","volume":"2","author":"liu","year":"2005","journal-title":"Proce IEEE Int Conf Machine Learning and Cybernetics"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSEA.2007.15"},{"journal-title":"AdventureWorksDW data warehouse","year":"0","key":"12"}],"event":{"name":"2008 Third International Conference on Digital Information Management (ICDIM)","start":{"date-parts":[[2008,11,13]]},"location":"London, United Kingdom","end":{"date-parts":[[2008,11,16]]}},"container-title":["2008 Third International Conference on Digital Information Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4733742\/4746691\/04746824.pdf?arnumber=4746824","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T11:17:38Z","timestamp":1489749458000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4746824\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icdim.2008.4746824","relation":{},"subject":[],"published":{"date-parts":[[2008,11]]}}}