{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T06:58:32Z","timestamp":1742799512928},"publisher-location":"Boston, MA","reference-count":18,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387290164"},{"type":"electronic","value":"9780387365848"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-36584-8_10","type":"book-chapter","created":{"date-parts":[[2008,5,5]],"date-time":"2008-05-05T22:11:39Z","timestamp":1210025499000},"page":"119-130","source":"Crossref","is-referenced-by-count":20,"title":["A SLA evaluation methodology in Service Oriented Architectures"],"prefix":"10.1007","author":[{"given":"Valentina","family":"Casola","sequence":"first","affiliation":[]},{"given":"Antonino","family":"Mazzeo","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Mazzocca","sequence":"additional","affiliation":[]},{"given":"Massimiliano","family":"Rak","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"K. Beznosov, B. Hartman, D.J. Flinn, and S Kawamoto. Mastering Web Services Security. Wiley."},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"A. Bosworth. Developing Web Services. Proceedings 17th International Conference on Data Engineering. IEEE Comput. Soc, pp.477\u201381. Los Alamitos, CA, USA, 2001.","DOI":"10.1109\/ICDE.2001.914861"},{"key":"10_CR3","unstructured":"Bishop M., Computer Security, Art and Science, Addison-Wesley, 2003."},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Brewer D., Nash M., The Chinese Wall Security Policy, Proceedings of the 1989 IEEE Symposium on Security and Privacy, pp.206\u2013214 (May 1989).","DOI":"10.1109\/SECPRI.1989.36295"},{"key":"10_CR5","unstructured":"Casola V., A Policy Based Methodology for the Analysis, Modelling and Implementation of Security Infrastructures, PhD Thesis, Second University of Naples, 2004."},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Casola V., Mazzeo A., Mazzocca N., Vittorini V., Policy Formalization to combine separate systems into larger connected networks of trust-Proceedings of Net-Con' 2002 Conference, Paris, France. 2002.","DOI":"10.1007\/978-0-387-35620-4_37"},{"key":"10_CR7","unstructured":"Casola V., Mazzeo A., Mazzocca N., Vittorini V, Policy based interoperability in distributed security infrastructures-Proceedings of 10th ISPE International conference on concurrent engineering: research and applications. Madeira, Spain. 2003."},{"key":"10_CR8","unstructured":"Casola V., Preziosi R., Rak M., Troiano L. 2004. Security Level Evaluation: Policy and Fuzzy Technique. In IEEE Proceedings of International Conference on Information Technology: Coding and Computing (ITCC 2004), vol. 2, pp.752\u2013756, Las Vegas, ISBN 0-7695-2108-8."},{"key":"10_CR9","volume-title":"JUCS-Journal of Universal Computer Science-edited by Ajith Abraham","author":"V. Casola","year":"2005","unstructured":"Casola V., Preziosi R., Rak M., Troiano L., A Reference Model for Security Level Evaluation: Policy and Fuzzy Techniques, in JUCS-Journal of Universal Computer Science-edited by Ajith Abraham, Oklahoma State University, USA and L.C. Jain, University of South Australia, January 2005"},{"key":"10_CR10","unstructured":"Curry I., Trusted Public-Key Infrastructures, Version 1.2, Entrust Technologies http:\/\/www.entrust.com. 2000."},{"key":"10_CR11","unstructured":"European Communities-Commission: ITSEC: Information Technology Security Evaluation Criteria; (Provisional Harmonised Criteria, Version 1.2, 28 June 1991) Office for Official Publications of the European Communities, Luxembourg 1991 (ISBN 92-826-3004-8)."},{"key":"10_CR12","unstructured":"Harris Corporation, Information Assurance Benchmark Analysis Study Final Report, 21 October 1999."},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Ronda R. Henning Security Service Level Agreements: Quantifiable Security for the Enterprice? ACM Proceedings of New Security Paradigm Workshop 1999, Ontario, Canada.","DOI":"10.1145\/335169.335194"},{"key":"10_CR14","unstructured":"Jajodia S., Samarati P., and Subrahmanian V. S., &#X201D;A Logical Language for Expressing Authorizations,&#X201D; Published in the proceedings of IEEE Symposium on Security and Privacy, Oakland, USA, 1997."},{"key":"10_CR15","unstructured":"Kagal L., Finin T, Joshi A., 2003. A Policy Language for a Pervasive Computing Environment, IEEE 4th International Workshop on Policies for Distributed Systems and Networks (Policy 2003)"},{"key":"10_CR16","doi-asserted-by":"publisher","first-page":"1104","DOI":"10.1016\/S0140-3664(99)00082-1","volume":"22","author":"T. Klobucar","year":"1999","unstructured":"Klobucar T., Jerman-Blazic B., A Formalization and evaluation of certificate policies, Computer Communication 22(1999), 1104\u20131110","journal-title":"Computer Communication"},{"issue":"3","key":"10_CR17","first-page":"267","volume":"19","author":"S.A. Kokolakis","year":"2000","unstructured":"Kokolakis S.A., Kiountouzis E.A., Achieving Interoperability in a multiple-security-policies environment, Computer & Security. Vol 19, no. 3 pp 267\u2013281, Elsevier Science 2000.","journal-title":"Achieving Interoperability in a multiple-security-policies environment, Computer & Security"},{"key":"10_CR18","unstructured":"Turnbull J. \u201cCross-Certification and PKI Policy Networking*#x201D; Version 1.1, Entrust Technologies http:\/\/www.entrust.com. 2000."}],"container-title":["Advances in Information Security","Quality of Protection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-36584-8_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,18]],"date-time":"2023-05-18T04:23:41Z","timestamp":1684383821000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-36584-8_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387290164","9780387365848"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-36584-8_10","relation":{},"subject":[]}}