{"id":"https://openalex.org/W1494441120","doi":"https://doi.org/10.1109/siit.2005.1563803","title":"Web service security - vulnerabilities and threats within the context of WS-security","display_name":"Web service security - vulnerabilities and threats within the context of WS-security","publication_year":2006,"publication_date":"2006-01-05","ids":{"openalex":"https://openalex.org/W1494441120","doi":"https://doi.org/10.1109/siit.2005.1563803","mag":"1494441120"},"language":"en","primary_location":{"id":"doi:10.1109/siit.2005.1563803","is_oa":false,"landing_page_url":"https://doi.org/10.1109/siit.2005.1563803","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 4th Conference on Standardization and Innovation in Information Technology, 2005.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034245893","display_name":"Jesper Holgersson","orcid":"https://orcid.org/0000-0002-8900-6139"},"institutions":[{"id":"https://openalex.org/I205158640","display_name":"University of Sk\u00f6vde","ror":"https://ror.org/051mrsz47","country_code":"SE","type":"education","lineage":["https://openalex.org/I205158640"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"J. Holgersson","raw_affiliation_strings":["University of Sk\u00f6vde, Skovde, Sweden"],"affiliations":[{"raw_affiliation_string":"University of Sk\u00f6vde, Skovde, Sweden","institution_ids":["https://openalex.org/I205158640"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113589525","display_name":"E.J. Soderstrom","orcid":null},"institutions":[{"id":"https://openalex.org/I205158640","display_name":"University of Sk\u00f6vde","ror":"https://ror.org/051mrsz47","country_code":"SE","type":"education","lineage":["https://openalex.org/I205158640"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"E. Soderstrom","raw_affiliation_strings":["University of Sk\u00f6vde, Skovde, Sweden"],"affiliations":[{"raw_affiliation_string":"University of Sk\u00f6vde, Skovde, Sweden","institution_ids":["https://openalex.org/I205158640"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5034245893"],"corresponding_institution_ids":["https://openalex.org/I205158640"],"apc_list":null,"apc_paid":null,"fwci":2.4625,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.90367644,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"138","last_page":"146"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.7522232532501221},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7427061200141907},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.7327569723129272},{"id":"https://openalex.org/keywords/ws-policy","display_name":"WS-Policy","score":0.6754305958747864},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.6489940285682678},{"id":"https://openalex.org/keywords/ws-addressing","display_name":"WS-Addressing","score":0.5584433674812317},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5364435911178589},{"id":"https://openalex.org/keywords/devices-profile-for-web-services","display_name":"Devices Profile for Web Services","score":0.5074970126152039},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4869283437728882},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.4685804545879364},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.46076440811157227},{"id":"https://openalex.org/keywords/soap","display_name":"SOAP","score":0.418558806180954},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.1261364221572876}],"concepts":[{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.7522232532501221},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7427061200141907},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.7327569723129272},{"id":"https://openalex.org/C190515685","wikidata":"https://www.wikidata.org/wiki/Q749179","display_name":"WS-Policy","level":5,"score":0.6754305958747864},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.6489940285682678},{"id":"https://openalex.org/C135910124","wikidata":"https://www.wikidata.org/wiki/Q263718","display_name":"WS-Addressing","level":5,"score":0.5584433674812317},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5364435911178589},{"id":"https://openalex.org/C183979223","wikidata":"https://www.wikidata.org/wiki/Q1206782","display_name":"Devices Profile for Web Services","level":5,"score":0.5074970126152039},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4869283437728882},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.4685804545879364},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.46076440811157227},{"id":"https://openalex.org/C17881449","wikidata":"https://www.wikidata.org/wiki/Q189620","display_name":"SOAP","level":2,"score":0.418558806180954},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.1261364221572876}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/siit.2005.1563803","is_oa":false,"landing_page_url":"https://doi.org/10.1109/siit.2005.1563803","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 4th Conference on Standardization and Innovation in Information Technology, 2005.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W201426213","https://openalex.org/W628340012","https://openalex.org/W1502448629","https://openalex.org/W1554082021","https://openalex.org/W1600383603","https://openalex.org/W1840063680","https://openalex.org/W1968581989","https://openalex.org/W1969206592","https://openalex.org/W1991722481","https://openalex.org/W2286876683","https://openalex.org/W3148259023"],"related_works":["https://openalex.org/W2370639870","https://openalex.org/W4268596","https://openalex.org/W2368260703","https://openalex.org/W2360211927","https://openalex.org/W100127945","https://openalex.org/W2366216657","https://openalex.org/W2371044121","https://openalex.org/W4252240957","https://openalex.org/W2358174607","https://openalex.org/W2187625726"],"abstract_inverted_index":{"A":[0],"Web":[1,35,59,80,100],"Service":[2],"(WS)":[3],"can":[4,12,68,103,112],"be":[5,13,51,69,104],"described":[6],"as":[7],"an":[8],"XML-based":[9],"interface":[10],"that":[11,61,102],"used":[14],"by":[15],"a":[16,21,26,39,52,91,118],"client":[17],"application":[18],"to":[19,37,44,50,116,121],"invoke":[20],"computing":[22],"service":[23,120],"distributed":[24],"in":[25,55,107,114],"network":[27],"via":[28],"standard":[29],"Internet":[30,65],"protocols.":[31],"In":[32],"order":[33,115],"for":[34,42,57,66],"Services":[36,60,81,101],"become":[38],"ubiquitous":[40],"technique":[41],"program":[43,45],"communication,":[46],"however,":[47],"there":[48],"need":[49],"solid":[53],"framework":[54],"place":[56],"how":[58],"utilizes":[62],"the":[63,75,97],"public":[64],"transport":[67],"properly":[70],"protected":[71],"and":[72],"secured.":[73],"As":[74],"situation":[76],"appears":[77],"today,":[78],"most":[79],"are":[82,87],"not":[83],"publicly":[84,105],"exposed":[85],"but":[86],"often":[88],"deployed":[89],"inside":[90],"corporate,":[92],"private":[93],"network.":[94],"This":[95],"hampers":[96],"vision":[98],"of":[99],"published":[106],"directories":[108],"which":[109],"potential":[110],"customers":[111],"search":[113],"find":[117],"suitable":[119],"satisfy":[122],"their":[123],"need.":[124]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
