{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:27:45Z","timestamp":1725568065520},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540290674"},{"type":"electronic","value":"9783540334989"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11558958_54","type":"book-chapter","created":{"date-parts":[[2006,2,23]],"date-time":"2006-02-23T15:02:16Z","timestamp":1140706936000},"page":"454-463","source":"Crossref","is-referenced-by-count":2,"title":["Design of Policy-Based Security Mechanisms in a Distributed Web Services Architecture"],"prefix":"10.1007","author":[{"given":"Valentina","family":"Casola","sequence":"first","affiliation":[]},{"given":"Antonino","family":"Mazzeo","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Mazzocca","sequence":"additional","affiliation":[]},{"given":"Salvatore","family":"Venticinque","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"54_CR1","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/PRDC.2001.992707","volume-title":"Proceedings of Pacific Rim International Symposium on Dependable Computing","author":"G.B. Barone","year":"2001","unstructured":"Barone, G.B., Margarita, N., Mazzocca, N., Mazzeo, A., Romano, L.: Secure Access to Personalized Web Services. In: Proceedings of Pacific Rim International Symposium on Dependable Computing, Seoul, Korea, pp. 266\u2013269. IEEE Comput. Soc, Los Alamitos (2001)"},{"key":"54_CR2","volume-title":"Secure Electronic Commerce","author":"M.S. Baum","year":"1997","unstructured":"Baum, M.S., Ford, W.: Secure Electronic Commerce. Prentice-Hall, Englewood Cliffs (1997)"},{"key":"54_CR3","unstructured":"Beznosov, K., Hartman, B., Flinn, D.J., Kawamoto, S.: Mastering Web Services Security. Wiley, Chichester"},{"key":"54_CR4","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1109\/WECWIS.2002.1021261","volume-title":"Proceedings of the 4th IEEE Int\u2019l Workshop on Advanced Issues of E-Commerce and Web- Based Information Systems (WECWIS 2002)","author":"S. Boll","year":"2002","unstructured":"Boll, S.: Modular Content Personalization Service Architecture for E-Commerce Applications. In: Proceedings of the 4th IEEE Int\u2019l Workshop on Advanced Issues of E-Commerce and Web- Based Information Systems (WECWIS 2002), pp. 213\u2013220. IEEE Comput. Soc., Los Alamitos (2002)"},{"key":"54_CR5","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1109\/ICDE.2001.914861","volume-title":"Proceedings 17th International Conference on Data Engineering","author":"A. Bosworth","year":"2001","unstructured":"Bosworth, A.: Developing Web Services. In: Proceedings 17th International Conference on Data Engineering, pp. 477\u2013481. IEEE Comput. Soc., Los Alamitos (2001)"},{"key":"54_CR6","unstructured":"David, A.: Chappell and Tyler Jewell. In: Java Web Services, O\u2019Reilly, Sebastopol"},{"key":"54_CR7","unstructured":"Ferraiolo, D., Cugini, J., Kuhn, D.: Role-Based Access Control (RBAC): Features and Motivations. In: Computer Security Applications, pp. 241\u2013248 (1995)"},{"key":"54_CR8","unstructured":"Hada, S., Kudo, M.: XML Access Control Language: Provisional Authorization for XML Documents. Tokyo Research Laboratory, IBM Research (2003), \n                      \n                        http:\/\/www.alphaworks.ibm.com\/aw.nsf\/download\/xmlsecuritysuite"},{"key":"54_CR9","unstructured":"Kreger, H.: Web Services Conceptual Architecture. IBM Software Group (May 2001)"},{"key":"54_CR10","unstructured":"RFC 2459. Internet X.509 Public Key Infrastructure Certificate and CRL Profile"},{"key":"54_CR11","unstructured":"XACML: eXtensible Access Control Markup Language, \n                      \n                        http:\/\/www.oasis-open.org\/committees\/xacml\/repository\/"},{"key":"54_CR12","unstructured":"AA.VV. UDDI technical white paper Role Uddi.Org (September 2000)"}],"container-title":["Lecture Notes in Computer Science","Applied Parallel Computing. State of the Art in Scientific Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11558958_54.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:11:04Z","timestamp":1619507464000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11558958_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540290674","9783540334989"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11558958_54","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}