{"id":"https://openalex.org/W2103508294","doi":"https://doi.org/10.1109/compsacw.2011.72","title":"Expressiveness Considerations of XML Signatures","display_name":"Expressiveness Considerations of XML Signatures","publication_year":2011,"publication_date":"2011-07-01","ids":{"openalex":"https://openalex.org/W2103508294","doi":"https://doi.org/10.1109/compsacw.2011.72","mag":"2103508294"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/compsacw.2011.72","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://www.nds.rub.de/media/nds/veroeffentlichungen/2013/03/25/paper-CR.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111891180","display_name":"Meiko Jensen","orcid":null},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"funder","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Meiko Jensen","raw_affiliation_strings":["Horst Gortz Inst. for IT-Security, Ruhr-Univ., Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Horst Gortz Inst. for IT-Security, Ruhr-Univ., Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5107344031","display_name":"Christopher Meyer","orcid":null},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"funder","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Christopher Meyer","raw_affiliation_strings":["Horst Gortz Inst. for IT-Security, Ruhr-Univ., Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Horst Gortz Inst. for IT-Security, Ruhr-Univ., Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]}],"institution_assertions":[{"id":"https://openalex.org/I177969490","display_name":"University of Southern Denmark","ror":"https://ror.org/03yrrjy16","country_code":"DK","type":"funder","lineage":["https://openalex.org/I177969490"]}],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.609,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":10,"citation_normalized_percentile":{"value":0.851169,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":85,"max":86},"biblio":{"volume":null,"issue":null,"first_page":"392","last_page":"397"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.998,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.998,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9973,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9897,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/soap","display_name":"SOAP","score":0.61364585}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8058809},{"id":"https://openalex.org/C34330436","wikidata":"https://www.wikidata.org/wiki/Q979532","display_name":"XML Signature","level":4,"score":0.7307832},{"id":"https://openalex.org/C173242113","wikidata":"https://www.wikidata.org/wiki/Q607488","display_name":"XML Encryption","level":4,"score":0.61657155},{"id":"https://openalex.org/C17881449","wikidata":"https://www.wikidata.org/wiki/Q189620","display_name":"SOAP","level":2,"score":0.61364585},{"id":"https://openalex.org/C11508877","wikidata":"https://www.wikidata.org/wiki/Q1124477","display_name":"Efficient XML Interchange","level":3,"score":0.5697881},{"id":"https://openalex.org/C44883583","wikidata":"https://www.wikidata.org/wiki/Q7622687","display_name":"Streaming XML","level":3,"score":0.5442042},{"id":"https://openalex.org/C8797682","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"XML","level":2,"score":0.47983906},{"id":"https://openalex.org/C34716815","wikidata":"https://www.wikidata.org/wiki/Q8042322","display_name":"XML Schema Editor","level":3,"score":0.47786373},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.47479075},{"id":"https://openalex.org/C55348073","wikidata":"https://www.wikidata.org/wiki/Q595926","display_name":"XML validation","level":3,"score":0.4366666},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.40583387}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/compsacw.2011.72","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.716.4739","pdf_url":"http://www.nds.rub.de/media/nds/veroeffentlichungen/2013/03/25/paper-CR.pdf","source":{"id":"https://openalex.org/S4306400349","display_name":"CiteSeer X (The Pennsylvania State University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I130769515","host_organization_name":"Pennsylvania State University","host_organization_lineage":["https://openalex.org/I130769515"],"host_organization_lineage_names":["Pennsylvania State University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.716.4739","pdf_url":"http://www.nds.rub.de/media/nds/veroeffentlichungen/2013/03/25/paper-CR.pdf","source":{"id":"https://openalex.org/S4306400349","display_name":"CiteSeer X (The Pennsylvania State University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I130769515","host_organization_name":"Pennsylvania State University","host_organization_lineage":["https://openalex.org/I130769515"],"host_organization_lineage_names":["Pennsylvania State University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.54,"id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":17,"referenced_works":["https://openalex.org/W1493610068","https://openalex.org/W1500174841","https://openalex.org/W1537258151","https://openalex.org/W1592336583","https://openalex.org/W1596447773","https://openalex.org/W1652324086","https://openalex.org/W1817601911","https://openalex.org/W2013578787","https://openalex.org/W2029693536","https://openalex.org/W2037358873","https://openalex.org/W2086070161","https://openalex.org/W2115621940","https://openalex.org/W2154467140","https://openalex.org/W2187360174","https://openalex.org/W2266218113","https://openalex.org/W2421583993","https://openalex.org/W2916447643"],"related_works":["https://openalex.org/W801203902","https://openalex.org/W564229925","https://openalex.org/W348005134","https://openalex.org/W2536894089","https://openalex.org/W2387469870","https://openalex.org/W2357844625","https://openalex.org/W2101607426","https://openalex.org/W2047342127","https://openalex.org/W2038564770","https://openalex.org/W173119470"],"abstract_inverted_index":{"XML":[0,35,71,79,82],"Signatures":[1,36,80],"are":[2],"used":[3],"to":[4,17,22],"protect":[5],"XML-based":[6],"Web":[7,27,63],"Service":[8],"communication":[9,65],"against":[10],"a":[11,38],"broad":[12],"range":[13],"of":[14,25,33,70,78],"attacks":[15],"related":[16],"man-in-the-middle":[18],"scenarios.":[19,94],"However,":[20],"due":[21],"the":[23,26,31,68,76],"complexity":[24],"Services":[28,64],"specification":[29],"landscape,":[30],"task":[32],"applying":[34],"in":[37,67,91],"robust":[39],"and":[40,45,81,89],"reliable":[41],"manner":[42],"becomes":[43],"more":[44,46],"challenging.":[47],"In":[48],"this":[49,53],"paper,":[50],"we":[51,74],"investigate":[52],"issue,":[54],"describing":[55],"how":[56],"an":[57],"attacker":[58],"can":[59],"still":[60],"interfere":[61],"with":[62],"even":[66],"presence":[69],"Signatures.":[72],"Additionally,":[73],"discuss":[75],"interrelation":[77],"Encryption,":[83],"focussing":[84],"on":[85],"their":[86],"security":[87],"properties":[88],"expressiveness":[90],"different":[92],"application":[93]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2103508294","counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":1}],"updated_date":"2025-02-16T13:28:45.726018","created_date":"2016-06-24"}