{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:50:28Z","timestamp":1725486628407},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540411437"},{"type":"electronic","value":"9783540400264"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-40026-5_12","type":"book-chapter","created":{"date-parts":[[2007,6,12]],"date-time":"2007-06-12T19:59:07Z","timestamp":1181678347000},"page":"179-193","source":"Crossref","is-referenced-by-count":12,"title":["Establishing Business Rules for Inter-Enterprise Electronic Commerce"],"prefix":"10.1007","author":[{"given":"Victoria","family":"Ungureanu","sequence":"first","affiliation":[]},{"given":"Naftaly H.","family":"Minsky","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,3,15]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"S. Abiteboul, V. Vianu, B. Forham, and Y. Yesha. Relational transducers for electronic commerce. In Symposium on Principles of Database Systems, pages 179\u2013187, June 1998.","key":"12_CR1","DOI":"10.1145\/275487.275507"},{"doi-asserted-by":"crossref","unstructured":"E. Bertino, F. Buccafurri, E. Ferrari, and P. Rullo. An authorization model and its formal semantics. In Proceedings of 5th European Symposium on Research in Computer Security, pages 127\u2013143, September 1998.","key":"12_CR2","DOI":"10.1007\/BFb0055860"},{"doi-asserted-by":"crossref","unstructured":"C. Bidan and V. Issarny. Dealing with multi-policy security in large open distributed systems. In Proceedings of 5th European Symposium on Research in Computer Security, pages 51\u201366, September 1998.","key":"12_CR3","DOI":"10.1007\/BFb0055855"},{"unstructured":"B. Cox, J. D. Tygar, and M. Sirbu. Netbill security and transaction protocol. In First US ENIX Workshop on Electronic Commerce, July 1995.","key":"12_CR4"},{"unstructured":"The Economist. E-commerce (a survey), pages 6\u201354. (February 26th 2000 issue).","key":"12_CR5"},{"unstructured":"The Economist. Riding the storm, pages 63\u201364. (November 6th 1999 issue).","key":"12_CR6"},{"doi-asserted-by":"crossref","unstructured":"L. Gong and X. Qian. Computational issues in secure interoperation.IEEE Tran-sctions on Software Engineering, pages 43\u201352, January 1996.","key":"12_CR7","DOI":"10.1109\/32.481533"},{"doi-asserted-by":"crossref","unstructured":"S. Ketchpel and H. Garcia-Molina. Making trust explicit in distributed commerce transactions. In Proceedings of the International Conference on Distributed Computing Systems, pages 270\u2013281, 1996.","key":"12_CR8","DOI":"10.1109\/ICDCS.1996.507925"},{"unstructured":"SETCo LLC. Set Secure Electronic Transaction protocol. website: http:\/\/www.ibm.com\/security\/html\/prod_setp.html .","key":"12_CR9"},{"doi-asserted-by":"crossref","unstructured":"N.H. Minsky and V. Ungureanu. A mechanism for establishing policies for electronic commerce. In The 18th International Conference on Distributed Computing Systems (ICDCS), pages 322\u2013331, May 1998.","key":"12_CR10","DOI":"10.1109\/ICDCS.1998.679732"},{"doi-asserted-by":"crossref","unstructured":"N.H. Minsky and V. Ungureanu. Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems. ACM Transactions on Software Engineering and Methodology, July 2000.","key":"12_CR11","DOI":"10.1145\/352591.352592"},{"key":"12_CR12","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1016\/S1389-1286(98)00019-X","volume":"31","author":"S.W. Smith","year":"1999","unstructured":"S.W. Smith and S. H. Weingart. Building a high-performance, programmable secure coprocessor. Computer Networks, 31:831\u2013860, April 1999.","journal-title":"Computer Networks"},{"unstructured":"P.K. Sokol. From EDI to Electronic Commerce-A Bussines Initiative. Me Graw-Hill, 1995.","key":"12_CR13"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-40026-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T22:08:08Z","timestamp":1556489288000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-40026-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540411437","9783540400264"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-40026-5_12","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}