{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T15:59:21Z","timestamp":1726070361926},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030432751"},{"type":"electronic","value":"9783030432768"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-43276-8_7","type":"book-chapter","created":{"date-parts":[[2020,3,7]],"date-time":"2020-03-07T08:03:08Z","timestamp":1583568188000},"page":"83-98","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Federation of Services from Autonomous Domains with Heterogeneous Access Control Models"],"prefix":"10.1007","author":[{"given":"Abdramane","family":"Bah","sequence":"first","affiliation":[]},{"given":"Pascal","family":"Andr\u00e9","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Attiogb\u00e9","sequence":"additional","affiliation":[]},{"given":"Jacqueline","family":"Konate","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,8]]},"reference":[{"key":"7_CR1","unstructured":"OASIS: Reference Architecture Foundation for Service Oriented Architecture Version 1.0, 04 December 2012"},{"key":"7_CR2","unstructured":"OASIS: Web Services Federation Language (WS-Federation) Version 1.2. Standard, 22 May 2009"},{"key":"7_CR3","unstructured":"International Telecommunication Union: Baseline identity management terms and definitions, 04 April 2010"},{"issue":"1","key":"7_CR4","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/j.dss.2012.05.049","volume":"55","author":"B Fabian","year":"2013","unstructured":"Fabian, B., Kunz, S., M\u00fcLler, S., G\u00fcNther, O.: Secure federation of semantic information services. Decis. Support Syst. 55(1), 385\u2013398 (2013)","journal-title":"Decis. Support Syst."},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Hafeez, K., Rajpoot, Q., Shibli, A.: Interoperability among access control models. In: 2012 15th International Multitopic Conference (INMIC), 111\u2013118, IEEE, Islamabad, December 2012","DOI":"10.1109\/INMIC.2012.6511466"},{"issue":"3","key":"7_CR6","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1080\/17517575.2017.1355985","volume":"12","author":"D Preuveneers","year":"2018","unstructured":"Preuveneers, D., Joosen, W., Ilie-Zudor, E.: Policy reconciliation for access control in dynamic cross-enterprise collaborations. Enterp. Inform. Syst. 12(3), 279\u2013299 (2018)","journal-title":"Enterp. Inform. Syst."},{"key":"7_CR7","unstructured":"Hu, V.C., et al.: Guide to attribute based access control (ABAC) definition and considerations. Technical report NIST SP 800\u2013162, National Institute of Standards and Technology, January 2014"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Beer Mohamed, M.I., Hassan, M.F., Safdar, S., Saleem, M.Q.: Adaptive security architectural model for protecting identity federation in service oriented computing. J. King Saud Univ. - Comput. Inf. Sci. (2019)","DOI":"10.1016\/j.jksuci.2019.03.004"},{"key":"7_CR9","unstructured":"Kallela, J.: Federated identity management solutions. T-110.5190 Seminar on Internetworking (2008)"},{"issue":"3","key":"7_CR10","first-page":"155","volume":"2","author":"M Menzel","year":"2007","unstructured":"Menzel, M., Wolter, C., Meinel, C.: Access control for cross-organisational web service composition. J. Inf. Assur. Secur. 2(3), 155\u2013160 (2007)","journal-title":"J. Inf. Assur. Secur."},{"key":"7_CR11","unstructured":"Dikmans, L., Van Luttikhuizen, R.: SOA made simple discover the true meaning behind the buzzword that is \u201cservice oriented architecture\u201d. Packt Pub, Birmingham (2013). OCLC: 847034163"},{"key":"7_CR12","volume-title":"Web Services: Principles and Technology","author":"MP Papazoglou","year":"2008","unstructured":"Papazoglou, M.P.: Web Services: Principles and Technology. Pearson\/Prentice Hall, Harlow (2008). OCLC: 255863191"},{"issue":"4","key":"7_CR13","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1177\/1548512909352790","volume":"6","author":"N Duan","year":"2009","unstructured":"Duan, N.: Design principles of a federated service-oriented architecture model for net-centric data sharing. J. Defense Model. Simul.: Appl. Methodol. Technol. 6(4), 165\u2013176 (2009)","journal-title":"J. Defense Model. Simul.: Appl. Methodol. Technol."},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Decat, M., Van Landuyt, D., Lagaisse, B., Joosen, W.: On the need for federated authorization in cross-organizational e-health platforms. In: Proceedings of the 8the international conference on Health Informatics, vol. 8, pp. 540\u2013546 (2015)","DOI":"10.5220\/0005264905400545"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-319-17127-2_15","volume-title":"Risks and Security of Internet and Systems","author":"S Haguouche","year":"2015","unstructured":"Haguouche, S., Jarir, Z.: Managing heterogeneous access control models cross-organization. In: Lopez, J., Ray, I., Crispo, B. (eds.) CRiSIS 2014. LNCS, vol. 8924, pp. 222\u2013229. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-17127-2_15"},{"key":"7_CR16","unstructured":"Fragoso-Rodriguez, U., Laurent-Maknavicius, M., Incera-Dieguez, J.: Federated identity architectures. In: Proceedings of 1st Mexican Conference on Informatics Security (MCIS 2006), p. 8 (2006)"},{"key":"7_CR17","unstructured":"BAH, A., Andr\u00e9, P., Attiogb\u00e9, C., Konat\u00e9, J.: Federated access control in service oriented architecture. Research report, LS2N, Universit\u00e9 de Nantes, April 2019"},{"key":"7_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87742-4","volume-title":"Security for Web Services and Service-Oriented Architectures","author":"E Bertino","year":"2010","unstructured":"Bertino, E., Martino, L., Paci, F., Squicciarini, A.: Security for Web Services and Service-Oriented Architectures. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-540-87742-4"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Aruna, S.: Security in web services- issues and challenges. Int. J. Eng. Res. V5(09) (2016). IJERTV5IS090245","DOI":"10.17577\/IJERTV5IS090245"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Singhal, A., Winograd, T., Scarfone, K.A.: Guide to secure web services. Technical report NIST SP 800\u201395, National Institute of Standards and Technology, Gaithersburg, MD (2007)","DOI":"10.6028\/NIST.SP.800-95"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Jasiul, B., Sliwa, J., Piotrowski, R., Goniacz, R., Amanowicz, M.: Authentication and authorization of users and services in federated SOA environments - challenges and opportunities, p. 13 (2010)","DOI":"10.26636\/jtit.2011.1.1134"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Rubio-Medrano, C.E., Zhao, Z., Doupe, A., Ahn, G.J.: Federated access management for collaborative network environments: framework and case study. In: Proceedings of the 20th ACM Symposium on Access Control Models and Technologies - SACMAT 2015, pp. 125\u2013134. ACM Press, Vienna (2015)","DOI":"10.1145\/2752952.2752977"},{"issue":"12","key":"7_CR23","first-page":"357","volume":"9","author":"L Na","year":"2015","unstructured":"Na, L., Yun-Wei, D., Tian-Wei, C., Chao, W., Yang, G., Yu-Chen, Z.: Cross-domain authorization management model for multi-levels hybrid cloud computing. Int. J. Secur. Appl. 9(12), 357\u2013366 (2015)","journal-title":"Int. J. Secur. Appl."},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Diniz, T., Felippe, A.C.D., Medeiros, T., Silva, C.E.D., Araujo, R.: Managing access to service providers in federated identity environments: a case study in a cloud storage service. In: 2015 XXXIII Brazilian Symposium on Computer Networks and Distributed Systems, pp. 199\u2013207. IEEE, Vitoria, May 2015","DOI":"10.1109\/SBRC.2015.32"}],"container-title":["Communications in Computer and Information Science","Information and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-43276-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T19:54:51Z","timestamp":1722542091000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-43276-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030432751","9783030432768"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-43276-8_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"8 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Information Security Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Johannesburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"South Africa","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"issa2019a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.infosecsa.co.za","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}