[{"year":"2011","citation":{"mla":"Jensen, Meiko, et al. “On the Effectiveness of XML Schema Validation for Countering XML Signature Wrapping Attacks.” <i>2011 1st International Workshop on Securing Services on the Cloud (IWSSC)</i>, 2011, doi:<a href=\"https://doi.org/10.1109/iwsscloud.2011.6049019\">10.1109/iwsscloud.2011.6049019</a>.","short":"M. Jensen, C. Meyer, J. Somorovsky, J. Schwenk, in: 2011 1st International Workshop on Securing Services on the Cloud (IWSSC), 2011.","bibtex":"@inproceedings{Jensen_Meyer_Somorovsky_Schwenk_2011, title={On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks}, DOI={<a href=\"https://doi.org/10.1109/iwsscloud.2011.6049019\">10.1109/iwsscloud.2011.6049019</a>}, booktitle={2011 1st International Workshop on Securing Services on the Cloud (IWSSC)}, author={Jensen, Meiko and Meyer, Christopher and Somorovsky, Juraj and Schwenk, Jörg}, year={2011} }","apa":"Jensen, M., Meyer, C., Somorovsky, J., &#38; Schwenk, J. (2011). On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks. In <i>2011 1st International Workshop on Securing Services on the Cloud (IWSSC)</i>. <a href=\"https://doi.org/10.1109/iwsscloud.2011.6049019\">https://doi.org/10.1109/iwsscloud.2011.6049019</a>","ieee":"M. Jensen, C. Meyer, J. Somorovsky, and J. Schwenk, “On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks,” in <i>2011 1st International Workshop on Securing Services on the Cloud (IWSSC)</i>, 2011.","chicago":"Jensen, Meiko, Christopher Meyer, Juraj Somorovsky, and Jörg Schwenk. “On the Effectiveness of XML Schema Validation for Countering XML Signature Wrapping Attacks.” In <i>2011 1st International Workshop on Securing Services on the Cloud (IWSSC)</i>, 2011. <a href=\"https://doi.org/10.1109/iwsscloud.2011.6049019\">https://doi.org/10.1109/iwsscloud.2011.6049019</a>.","ama":"Jensen M, Meyer C, Somorovsky J, Schwenk J. On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks. In: <i>2011 1st International Workshop on Securing Services on the Cloud (IWSSC)</i>. ; 2011. doi:<a href=\"https://doi.org/10.1109/iwsscloud.2011.6049019\">10.1109/iwsscloud.2011.6049019</a>"},"publication_status":"published","publication_identifier":{"isbn":["9781457711855"]},"title":"On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks","doi":"10.1109/iwsscloud.2011.6049019","date_updated":"2022-01-06T06:52:39Z","author":[{"full_name":"Jensen, Meiko","last_name":"Jensen","first_name":"Meiko"},{"last_name":"Meyer","full_name":"Meyer, Christopher","first_name":"Christopher"},{"first_name":"Juraj","id":"83504","full_name":"Somorovsky, Juraj","orcid":"0000-0002-3593-7720","last_name":"Somorovsky"},{"last_name":"Schwenk","full_name":"Schwenk, Jörg","first_name":"Jörg"}],"date_created":"2020-02-15T09:23:35Z","status":"public","type":"conference","publication":"2011 1st International Workshop on Securing Services on the Cloud (IWSSC)","language":[{"iso":"eng"}],"_id":"15887","user_id":"83504"}]
