{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:57:54Z","timestamp":1725490674278},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540749738"},{"type":"electronic","value":"9783540749745"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11948148_14","type":"book-chapter","created":{"date-parts":[[2006,11,27]],"date-time":"2006-11-27T13:22:41Z","timestamp":1164633761000},"page":"165-178","source":"Crossref","is-referenced-by-count":4,"title":["AMPol-Q: Adaptive Middleware Policy to Support QoS"],"prefix":"10.1007","author":[{"given":"Raja","family":"Afandi","sequence":"first","affiliation":[]},{"given":"Jianqing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Carl A.","family":"Gunter","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Zeng, L., Benatallah, B., Ngu, A., Dumas, M., Kalagnanam, J., Chang, H.: Qos-aware middleware for web services composition. In: ITSE 2004: IEEE Trans. on Software Engr. (2004)"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Casati, F., Ilnicki, S., Jin, L., Krishnamoorthy, V., Shan, M.: Adaptive and dynamic service composition in eflow. Tech. Report, HPL-200039, Software Tech. Lab. (2000)","DOI":"10.1007\/3-540-45140-4_3"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Zeng, L., Benatallah, B., Dumas, M., Kalagnanam, J., Sheng, Q.: Quality driven web service composition. In: WWW 2003: Proc. of 12th Int. World Wide Web Conf. (2003)","DOI":"10.1145\/775152.775211"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/3-540-45598-1_6","volume-title":"Electronic Commerce","author":"G. Piccinelli","year":"2001","unstructured":"Piccinelli, G., Stefanelli, C., Trastour, D.: Trusted mediation for e-service provision in electronic marketplaces. In: Fiege, L., M\u00fchl, G., Wilhelm, U.G. (eds.) WELCOM 2001. LNCS, vol.\u00a02232, p. 39. Springer, Heidelberg (2001)"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Mahbub, K., Spanoudakis, G.: A framework for requirements monitoring of service based systems. In: ICSOC 2004: Proc. of the 2nd Int. Conf. on Service Oriented Computing (2004)","DOI":"10.1145\/1035167.1035181"},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1007\/11596141_30","volume-title":"Service-Oriented Computing - ICSOC 2005","author":"R. Jurca","year":"2005","unstructured":"Jurca, R., Faltings, B.: Reputation-based service level agreements for web services. In: Benatallah, B., Casati, F., Traverso, P. (eds.) ICSOC 2005. LNCS, vol.\u00a03826, pp. 396\u2013409. Springer, Heidelberg (2005)"},{"key":"14_CR7","volume-title":"Int. Conf. on Web Services (ICWS 2005)","author":"K.D. Lux","year":"2005","unstructured":"Lux, K.D., May, M.J., Bhattad, N.L., Gunter, C.A.: WSEmail: Secure Internet messaging based on Web services. In: Int. Conf. on Web Services (ICWS 2005). IEEE, Los Alamitos (2005)"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Tsesmetzis, D., Roussaki, I.G., Papaioannou, I., Anagnostou, M.E.: Qos awareness support in web-service semantics. In: AICT-ICIW 2006 (2006)","DOI":"10.1109\/AICT-ICIW.2006.156"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Dobson, G., Lock, R., Sommerville, I.: Qosont: a qos ontology for service-centric systems. In: EUROMICRO-SEAA 2005 (2005)","DOI":"10.1109\/EUROMICRO.2005.49"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Kagal, L., Paolucci, M., Srinivasan, N., Denker, G., Finin, T., Sycara, K.: Authorization and privacy for semantic web services. In: AAAI 2004: Workshop on Semantic Web Services (2004)","DOI":"10.1109\/MIS.2004.23"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Uszok, A., Bradshaw, J.M., Jeffers, R., Johnson, M., Tate, A., Dalton, J., Aitken, S.: Kaos policy management for semantic web services. In: IIS 2004: IEEE Intelligent Systems (2004)","DOI":"10.1109\/MIS.2004.31"},{"key":"14_CR12","unstructured":"AMPol-Q: website (2006), http:\/\/seclab.cs.uiuc.edu\/ampol\/AMPol-Q"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Sirin, E., Parsia, B., Hendler, J.: Filtering and selecting semantic web services with interactive composition techiques. IEEE Intelligent Systems\u00a019(4) (2004)","DOI":"10.1109\/MIS.2004.27"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Pathak, J., Koul, N., Caragea, D., Honavar, V.G.: A framework for semantic web services discovery. In: WIDM 2005 (2005)","DOI":"10.1145\/1097047.1097057"},{"key":"14_CR15","unstructured":"Shuping, R.: A model for web service discovery with qos. In: ACM SIGecom (2003)"},{"key":"14_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/3-540-39200-9_18","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"L. Ahn von","year":"2003","unstructured":"von Ahn, L., Blum, M., Hopper, N., Langford, J.: CAPTCHA: Using hard AI problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 294\u2013311. Springer, Heidelberg (2003)"},{"key":"14_CR17","unstructured":"Juels, A., Brainard, J.: Client puzzles: A cryptographic defense against connection depletion attacks. In: NDSS 1999: Networks and Distributed Security Systems (1999)"},{"key":"14_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/3-540-48071-4_10","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"C. Dwork","year":"1993","unstructured":"Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 139\u2013147. Springer, Heidelberg (1993)"},{"issue":"3","key":"14_CR19","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., Franklin, M.: Identity based ecncryption from the Weil pairing. SIAM J. of Computing\u00a032(3), 586\u2013615 (2003)","journal-title":"SIAM J. of Computing"},{"key":"14_CR20","volume-title":"4th IEEE European Conference on Web Services (ECOWS 2006)","author":"R. Afandi","year":"2006","unstructured":"Afandi, R., Zhang, J., Hafiz, M., Gunter, C.A.: AMPol: Adaptive Messaging Policy. In: 4th IEEE European Conference on Web Services (ECOWS 2006), Zurich, Switzerland. IEEE Conference Publishing Services, Los Alamitos (2006)"},{"key":"14_CR21","series-title":"Lecture Notes in Computer Science","volume-title":"ICSOC 2005","author":"D. Karastoyanova","year":"2005","unstructured":"Karastoyanova, D., Buchmann, A.: Development life cycle of web service-based business processes. enabling dynamic invocation of web services at run time. In: Benatallah, B., Casati, F., Traverso, P. (eds.) ICSOC 2005. LNCS, vol.\u00a03826, Springer, Hiedelberg (2005)"},{"key":"14_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/BFb0053381","volume-title":"ECOOP \u201997 - Object-Oriented Programming","author":"G. Kiczales","year":"1997","unstructured":"Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C., Lopes, C., Loingtier, J.M., Irwin, J.: Aspect-oriented programming. In: Aksit, M., Matsuoka, S. (eds.) ECOOP 1997. LNCS, vol.\u00a01241, pp. 220\u2013242. Springer, Heidelberg (1997)"},{"key":"14_CR23","unstructured":"H\u00fcrsch, W., Lopes, C.V.: Separation of concerns. Technical Report NU-CCS-95-03, College of Computer Science, Northeastern University, Boston, Massachusetts (1995)"},{"key":"14_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/11596141_11","volume-title":"Service-Oriented Computing - ICSOC 2005","author":"T. Yu","year":"2005","unstructured":"Yu, T., Lin, K.: Service selection algorithms for composing complex services with multiple qos constraints. In: Benatallah, B., Casati, F., Traverso, P. (eds.) ICSOC 2005. LNCS, vol.\u00a03826, pp. 130\u2013143. Springer, Heidelberg (2005)"},{"key":"14_CR25","volume-title":"WWW 2004","author":"N.K. Mukhi","year":"2004","unstructured":"Mukhi, N.K., Konuru, R., Curbera, F.: Cooperative middleware specialization for service oriented architectures. In: WWW 2004. IEEE Computer Society, Los Alamitos (2004)"},{"key":"14_CR26","volume-title":"ICSOC 2004","author":"N. Mukhi","year":"2004","unstructured":"Mukhi, N., Plebanni, P., Silva-Lepe, I., Mikalsen, T.: Supporting policy-driven behaviors in web services: Experiences and issues. In: ICSOC 2004. IEEE Computer Society, Los Alamitos (2004)"},{"key":"14_CR27","volume-title":"WISE 2003: Proceedings of the Fourth International Conference on Web Information Systems Engineering","author":"F. Baligand","year":"2004","unstructured":"Baligand, F., Monfort, V.: A concrete solution for web services adaptability using policies and aspects. In: WISE 2003: Proceedings of the Fourth International Conference on Web Information Systems Engineering. IEEE Computer Society, Los Alamitos (2004)"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Bosloper, I., Siljee, J., Nijhuis, J., Hammer, D.: Creating self-adaptive service systems with dysoa. In: ECOWS 2005, Proceedings of the 3rd European Conference on Web Services (2005)","DOI":"10.1109\/ECOWS.2005.10"},{"key":"14_CR29","volume-title":"ICSE 2004: Proceedings of the 26th International Conference on Software Engineering","author":"E. Wohlstadter","year":"2004","unstructured":"Wohlstadter, E., Tai, S., Mikalsen, T., Rouvellou, I., Devanbu, P.: Glueqos: Middleware to sweeten quality-of-service policy interaction. In: ICSE 2004: Proceedings of the 26th International Conference on Software Engineering. IEEE Computer Society, Los Alamitos (2004)"},{"key":"14_CR30","doi-asserted-by":"crossref","unstructured":"Bobba, R., Fatemieh, O., Khan, F., Gunter, C.A., Khurana, H.: Using attribute-based access control to enable attribute-based messaging. In: ACSAC 2006, Miami Beach, FL, Applied Computer Security Associates (2006)","DOI":"10.1109\/ACSAC.2006.53"},{"key":"14_CR31","volume-title":"Formal Methods in Software Engineering (FMSE 2006)","author":"A.J. Lee","year":"2006","unstructured":"Lee, A.J., Boyer, J.P., Olson, L.E., Gunter, C.A.: Defeasible security policy composition for web services. In: Formal Methods in Software Engineering (FMSE 2006), Alexandria, VA. ACM, New York (2006)"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing \u2013 ICSOC 2007"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11948148_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,9]],"date-time":"2023-05-09T20:51:18Z","timestamp":1683665478000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11948148_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540749738","9783540749745"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/11948148_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}