{"id":"https://openalex.org/W4234560408","doi":"https://doi.org/10.1016/s1363-4127(01)00206-0","title":"XML security","display_name":"XML security","publication_year":2001,"publication_date":"2001-06-01","ids":{"openalex":"https://openalex.org/W4234560408","doi":"https://doi.org/10.1016/s1363-4127(01)00206-0"},"language":"en","primary_location":{"id":"doi:10.1016/s1363-4127(01)00206-0","is_oa":false,"landing_page_url":"https://doi.org/10.1016/s1363-4127(01)00206-0","pdf_url":null,"source":{"id":"https://openalex.org/S206909572","display_name":"Information Security Technical Report","issn_l":"1363-4127","issn":["1363-4127","1873-605X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Security Technical Report","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061694501","display_name":"Elisa Bertino","orcid":"https://orcid.org/0000-0002-4029-7051"},"institutions":[{"id":"https://openalex.org/I189158943","display_name":"University of Milan","ror":"https://ror.org/00wjc7c48","country_code":"IT","type":"education","lineage":["https://openalex.org/I189158943"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Elisa Bertino","raw_affiliation_strings":["Universit\u00e0 degli Studi di Milano, Italy"],"affiliations":[{"raw_affiliation_string":"Universit\u00e0 degli Studi di Milano, Italy","institution_ids":["https://openalex.org/I189158943"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057684417","display_name":"Barbara Carminati","orcid":"https://orcid.org/0000-0002-7502-4731"},"institutions":[{"id":"https://openalex.org/I189158943","display_name":"University of Milan","ror":"https://ror.org/00wjc7c48","country_code":"IT","type":"education","lineage":["https://openalex.org/I189158943"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Barbara Carminati","raw_affiliation_strings":["Universit\u00e0 degli Studi di Milano, Italy"],"affiliations":[{"raw_affiliation_string":"Universit\u00e0 degli Studi di Milano, Italy","institution_ids":["https://openalex.org/I189158943"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036362276","display_name":"Elena Ferrari","orcid":"https://orcid.org/0000-0002-7312-6769"},"institutions":[{"id":"https://openalex.org/I115752224","display_name":"University of Insubria","ror":"https://ror.org/00s409261","country_code":"IT","type":"education","lineage":["https://openalex.org/I115752224"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Elena Ferrari","raw_affiliation_strings":["Universit\u00e0 degli Studi dell\u2019Insubria, Como, Italy"],"affiliations":[{"raw_affiliation_string":"Universit\u00e0 degli Studi dell\u2019Insubria, Como, Italy","institution_ids":["https://openalex.org/I115752224"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5061694501"],"corresponding_institution_ids":["https://openalex.org/I189158943"],"apc_list":null,"apc_paid":null,"fwci":4.0832,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.95323093,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":"6","issue":"2","first_page":"44","last_page":"58"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9664999842643738,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9664999842643738,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9656999707221985,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8271667957305908},{"id":"https://openalex.org/keywords/xml-signature","display_name":"XML Signature","score":0.7934024930000305},{"id":"https://openalex.org/keywords/xml-encryption","display_name":"XML Encryption","score":0.764479398727417},{"id":"https://openalex.org/keywords/xml-validation","display_name":"XML validation","score":0.6544287800788879},{"id":"https://openalex.org/keywords/xml","display_name":"XML","score":0.6305907368659973},{"id":"https://openalex.org/keywords/efficient-xml-interchange","display_name":"Efficient XML Interchange","score":0.6256318092346191},{"id":"https://openalex.org/keywords/streaming-xml","display_name":"Streaming XML","score":0.5975739359855652},{"id":"https://openalex.org/keywords/xml-framework","display_name":"XML framework","score":0.4894010126590729},{"id":"https://openalex.org/keywords/xml-schema-editor","display_name":"XML Schema Editor","score":0.4838913381099701},{"id":"https://openalex.org/keywords/document-structure-description","display_name":"Document Structure Description","score":0.4824150800704956},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4459218382835388},{"id":"https://openalex.org/keywords/xml-database","display_name":"XML database","score":0.44340717792510986},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37271296977996826},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2614620327949524},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.060839831829071045}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8271667957305908},{"id":"https://openalex.org/C34330436","wikidata":"https://www.wikidata.org/wiki/Q979532","display_name":"XML Signature","level":4,"score":0.7934024930000305},{"id":"https://openalex.org/C173242113","wikidata":"https://www.wikidata.org/wiki/Q607488","display_name":"XML Encryption","level":4,"score":0.764479398727417},{"id":"https://openalex.org/C55348073","wikidata":"https://www.wikidata.org/wiki/Q595926","display_name":"XML validation","level":3,"score":0.6544287800788879},{"id":"https://openalex.org/C8797682","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"XML","level":2,"score":0.6305907368659973},{"id":"https://openalex.org/C11508877","wikidata":"https://www.wikidata.org/wiki/Q1124477","display_name":"Efficient XML Interchange","level":3,"score":0.6256318092346191},{"id":"https://openalex.org/C44883583","wikidata":"https://www.wikidata.org/wiki/Q7622687","display_name":"Streaming XML","level":3,"score":0.5975739359855652},{"id":"https://openalex.org/C21761406","wikidata":"https://www.wikidata.org/wiki/Q8042330","display_name":"XML framework","level":3,"score":0.4894010126590729},{"id":"https://openalex.org/C34716815","wikidata":"https://www.wikidata.org/wiki/Q8042322","display_name":"XML Schema Editor","level":3,"score":0.4838913381099701},{"id":"https://openalex.org/C68699486","wikidata":"https://www.wikidata.org/wiki/Q265904","display_name":"Document Structure Description","level":3,"score":0.4824150800704956},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4459218382835388},{"id":"https://openalex.org/C183068750","wikidata":"https://www.wikidata.org/wiki/Q357393","display_name":"XML database","level":3,"score":0.44340717792510986},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37271296977996826},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2614620327949524},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.060839831829071045},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1016/s1363-4127(01)00206-0","is_oa":false,"landing_page_url":"https://doi.org/10.1016/s1363-4127(01)00206-0","pdf_url":null,"source":{"id":"https://openalex.org/S206909572","display_name":"Information Security Technical Report","issn_l":"1363-4127","issn":["1363-4127","1873-605X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Security Technical Report","raw_type":"journal-article"},{"id":"pmh:oai:irinsubria.uninsubria.it:11383/1707398","is_oa":false,"landing_page_url":"http://hdl.handle.net/11383/1707398","pdf_url":null,"source":{"id":"https://openalex.org/S4377196351","display_name":"IrInSubria (University of Insubria)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I115752224","host_organization_name":"University of Insubria","host_organization_lineage":["https://openalex.org/I115752224"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W348005134","https://openalex.org/W2536894089","https://openalex.org/W2047342127","https://openalex.org/W2385975321","https://openalex.org/W1591876566","https://openalex.org/W2560505635","https://openalex.org/W2117064692","https://openalex.org/W2552861811","https://openalex.org/W585825282","https://openalex.org/W2157844372"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2022-05-12T00:00:00"}
