{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T20:51:16Z","timestamp":1654116676930},"reference-count":0,"publisher":"IBM","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IBM Syst. J."],"published-print":{"date-parts":[[2001]]},"DOI":"10.1147\/sj.401.0130","type":"journal-article","created":{"date-parts":[[2010,4,5]],"date-time":"2010-04-05T18:33:53Z","timestamp":1270492433000},"page":"130-152","source":"Crossref","is-referenced-by-count":11,"title":["Security challenges for Enterprise Java in an e-business environment"],"prefix":"10.1147","volume":"40","author":[{"given":"L.","family":"Koved","sequence":"first","affiliation":[]},{"given":"A.","family":"Nadalin","sequence":"additional","affiliation":[]},{"given":"N.","family":"Nagaratnam","sequence":"additional","affiliation":[]},{"given":"M.","family":"Pistoia","sequence":"additional","affiliation":[]},{"given":"T.","family":"Shrader","sequence":"additional","affiliation":[]}],"member":"3082","container-title":["IBM Systems Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5288519\/5386955\/05386964.pdf?arnumber=5386964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,14]],"date-time":"2017-11-14T02:44:35Z","timestamp":1510627475000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5386964\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"references-count":0,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1147\/sj.401.0130","relation":{},"ISSN":["0018-8670"],"issn-type":[{"value":"0018-8670","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]}}}