{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:56:21Z","timestamp":1725544581114},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540333760"},{"type":"electronic","value":"9783540333777"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11734666_15","type":"book-chapter","created":{"date-parts":[[2006,3,9]],"date-time":"2006-03-09T12:10:32Z","timestamp":1141906232000},"page":"196-210","source":"Crossref","is-referenced-by-count":18,"title":["Information Flow Control to Secure Dynamic Web Service Composition"],"prefix":"10.1007","author":[{"given":"Dieter","family":"Hutter","sequence":"first","affiliation":[]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-32254-2_14","volume-title":"Mechanizing Mathematical Reasoning","author":"F. Baader","year":"2005","unstructured":"Baader, F., Horrocks, I., Sattler, U.: Description logics as ontology languages for the semantic web. In: Hutter, D., Stephan, W. (eds.) Mechanizing Mathematical Reasoning. LNCS (LNAI), vol.\u00a02605, Springer, Heidelberg (2005)"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Bell, D.E., LaPadula, L.: Secure computer systems: Unified exposition and multics interpretation. Technical Report MTR-2997, MITRE (1976)","DOI":"10.21236\/ADA023588"},{"key":"15_CR3","unstructured":"Benjamins, V.R., Plaza, E., Motta, E., Fensel, D., Studer, R., Wielinga, B., Schreiber, G., Zdrahal, Z.: Ibrow3 - an intelligent brokering service for knowledge-component reuse on the world wide web. In: 11th Knowledge Acquisition for Knowledge-Based System Workshop (KAW 1998) (1998)"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Berners-Lee, T., Hendler, J.,, J., Lassila, O.: The semantic web, Scientific American (May 2001)","DOI":"10.1038\/scientificamerican0501-34"},{"issue":"1","key":"15_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/504909.504910","volume":"5","author":"P.A. Bonatti","year":"2002","unstructured":"Bonatti, P.A., De Capitani di Vimercati, S., Samarati, P.: An algebra for composing access control policies. ACM Transactions on Information and System Security\u00a05(1), 1\u201335 (2002)","journal-title":"ACM Transactions on Information and System Security"},{"key":"15_CR6","volume-title":"Web Intelligence","author":"J. Bryson","year":"2002","unstructured":"Bryson, J., Martin, D., McIlraith, S.I., Stein, L.A.: Agent-based composite services in DAML-S: The behavior-oriented design of an intelligent semantic web. In: Zhong, N., Liu, J., Lao, Y. (eds.) Web Intelligence, Springer, Heidelberg (2002)"},{"key":"15_CR7","unstructured":"DAML-S DARPA agent markup language for services, version 0.9, http:\/\/www.daml.org\/services\/daml-s\/0.9\/daml-s.html"},{"key":"15_CR8","first-page":"84","volume-title":"Agent Oriented Software Engineering, AOSE","author":"N. Dulay","year":"2001","unstructured":"Dulay, N., Damianou, N., Lupu, E., Sloman, M.: A policy language for the management of distributed agents. In: Agent Oriented Software Engineering, AOSE, pp. 84\u2013100. Springer, Heidelberg (2001)"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Security Policies and Security Models. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, pp. 11\u201320 (1982)","DOI":"10.1109\/SP.1982.10014"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Inference Control and Unwinding. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, pp. 75\u201386 (1984)","DOI":"10.1109\/SP.1984.10019"},{"key":"15_CR11","unstructured":"IBM and Microsoft. Security in a Web Service World: A proposed architecture and roadmap (April 2002), www-106.ibm.com\/developerworks\/webservices\/library\/ws-secmap"},{"issue":"12","key":"15_CR12","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/2.970591","volume":"24","author":"L. Kagal","year":"2001","unstructured":"Kagal, L., Finin, T., Joshi, A.: Trust based security for pervasive computing enviroments. IEEE Computer\u00a024(12), 154\u2013157 (2001)","journal-title":"IEEE Computer"},{"key":"15_CR13","unstructured":"Kagal, L., Finin, T., Joshi, A.: Developing secure agent systems using delegation based trust management. In: Fischer, K., Hutter, D. (eds.) Security of Mobile MultiAgent Systems (SEMAS 2002) held at Autonomous Agents and MultiAgent Systems (AAMAS 2002) (2002)"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Klusch, M., Gerber, A., Schmidt, M.: Semantic web service composition planning with owls-xplan. In: 1st Intl. AAAI Fall Symposium on Agents and the Semantic Web (2005)","DOI":"10.1109\/WI-IATW.2006.68"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Lamanna, D.D., Skene, J., Emmerich, W.: Slang: A language for defining service level agreements. In: IEEE Workshop on Future Trends of Distributed Computing Systems, FTDCS, p. 100 (2003)","DOI":"10.1109\/FTDCS.2003.1204317"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Mantel, H.: Possibilistic Definitions of Security \u2013 An Assembly Kit. In: Proceedings of the IEEE Computer Security Foundations Workshop, Cambridge, UK, pp. 185\u2013199 (2000)","DOI":"10.1109\/CSFW.2000.856936"},{"issue":"1","key":"15_CR17","doi-asserted-by":"publisher","first-page":"37","DOI":"10.3233\/JCS-1992-1103","volume":"1","author":"J.D. McLean","year":"1992","unstructured":"McLean, J.D.: Proving Noninterference and Functional Correctness using Traces. Journal of Computer Security\u00a01(1), 37\u201357 (1992)","journal-title":"Journal of Computer Security"},{"key":"15_CR18","volume-title":"Proceedings of IEEE Symposium on Security and Privacy","author":"J.D. McLean","year":"1994","unstructured":"McLean, J.D.: A general theory of composition for trace sets closed under selective interleaving functions. In: Proceedings of IEEE Symposium on Security and Privacy, IEEE Computer Society, Los Alamitos (1994)"},{"key":"15_CR19","unstructured":"OWL ontology web language, w3c standard technical recommendation (2003), http:\/\/www.w3.org\/TR\/,\/WD-owl-ref-20030331\/"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Patwardhan, A., Korolev, V., Kagal, L., Joshi, A.: Enforcing policies in pervasive environments. In: MobiQuitous, pp. 299\u2013308 (2004)","DOI":"10.1109\/MOBIQ.2004.1331736"},{"key":"15_CR21","unstructured":"Peer, J.: Web service composition as ai planning - a survey. Technical report, University of St. Gallen (March 2005)"},{"issue":"1","key":"15_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1017\/S0269888904000116","volume":"19","author":"S.D. Ramchurn","year":"2004","unstructured":"Ramchurn, S.D., Huynh, D., Jennings, N.R.: Trust in multi-agent systems. The Knowledge Engineering Review\u00a019(1), 1\u201325 (2004)","journal-title":"The Knowledge Engineering Review"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE Journal on Selected Areas in Communications\u00a021(1) (2003)","DOI":"10.1109\/JSAC.2002.806121"},{"key":"15_CR24","unstructured":"Sheshagiri, M., desJardins, M., Finin, T.: A planner for composing services described in DAML-S. In: Proceedings of AAMAS 2003 Workshop on Web Services and Agent-Based Engineering (2003)"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Smith, G., Volpano, D.: Secure information flow in a multi-threaded imperative language. In: Conference Record of POPL 1998: The 25TH ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, San Diego, California, pp. 355\u2013364. New York, NY (1998)","DOI":"10.1145\/268946.268975"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Stufflebeam, W.H., Ant\u00f3n, A.I., He, Q., Jain, N.: Specifying privacy policies with p3p and epal: lessons learned. In: Workshop on Privacy in the Electronic Society, WPES, p. 35 (2004)","DOI":"10.1145\/1029179.1029190"},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Uszok, A., Bradshaw, J.M., Jeffers, R., Tate, A., Dalton, J.: Applying kaos services to ensure policy compliance for semantic web services workflow composition and enactment. In: International Semantic Web Conference, pp. 425\u2013440 (2004)","DOI":"10.1007\/978-3-540-30475-3_30"},{"issue":"3","key":"15_CR28","doi-asserted-by":"publisher","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","volume":"4","author":"D.M. Volpano","year":"1996","unstructured":"Volpano, D.M., Smith, G.: A sound type system for secure flow analysis. Journal of Computer Security\u00a04(3), 167\u2013187 (1996)","journal-title":"Journal of Computer Security"},{"key":"15_CR29","doi-asserted-by":"crossref","unstructured":"Volpano, D.M., Smith, G.: A type-based approach to program security. In: TAPSOFT, pp. 607\u2013621 (1997)","DOI":"10.21236\/ADA486429"},{"key":"15_CR30","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45484-5_20","volume-title":"Formal Approaches to Agent-Based Systems","author":"R. Waldinger","year":"2001","unstructured":"Waldinger, R.: Deductive composition of web software agents. In: Rash, J.L., Rouff, C.A., Truszkowski, W., Gordon, D.F., Hinchey, M.G. (eds.) FAABS 2000. LNCS (LNAI), vol.\u00a01871, Springer, Heidelberg (2001)"},{"key":"15_CR31","doi-asserted-by":"crossref","unstructured":"Wu, D., Parsia, B., Sirin, E., Hendler, J., Nau, D.: Automating DAML-S web services composition using SHOP2. In: Proceedings of the 2nd International Semantic Web Conference (ISWC 2003), Sanibel Island, Florida, USA, October 2003, pp. 20\u201323 (2003)","DOI":"10.1007\/978-3-540-39718-2_13"},{"key":"15_CR32","doi-asserted-by":"crossref","unstructured":"Zakinthinos, A., Lee, E.S.: A General Theory of Security Properties. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, pp. 94\u2013102 (1997)","DOI":"10.1109\/SECPRI.1997.601322"}],"container-title":["Lecture Notes in Computer Science","Security in Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11734666_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,17]],"date-time":"2019-04-17T07:40:29Z","timestamp":1555486829000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11734666_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540333760","9783540333777"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/11734666_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}