{"id":60108,"date":"2024-10-11T05:24:43","date_gmt":"2024-10-11T05:24:43","guid":{"rendered":"https:\/\/www.cloudthat.com\/resources\/?post_type=blog&#038;p=60108"},"modified":"2024-10-11T05:25:53","modified_gmt":"2024-10-11T05:25:53","slug":"security-in-dataverse-an-explorative-study","status":"publish","type":"blog","link":"https:\/\/www.cloudthat.com\/resources\/blog\/security-in-dataverse-an-explorative-study","title":{"rendered":"Security in Dataverse:  An Explorative Study"},"content":{"rendered":"","protected":false},"author":1271,"featured_media":60333,"parent":0,"comment_status":"open","ping_status":"closed","template":"","blog_category":[9503],"user_email":"daliyak@cloudthat.com","published_by":"6288","primary-authors":"","secondary-authors":"","acf":[],"_links":{"self":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/60108"}],"collection":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/users\/1271"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/comments?post=60108"}],"version-history":[{"count":4,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/60108\/revisions"}],"predecessor-version":[{"id":60336,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/60108\/revisions\/60336"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/media\/60333"}],"wp:attachment":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/media?parent=60108"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog_category?post=60108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}