{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:46:25Z","timestamp":1742913985482,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030493356"},{"type":"electronic","value":"9783030493363"}],"license":[{"start":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T00:00:00Z","timestamp":1597276800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T00:00:00Z","timestamp":1597276800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-49336-3_35","type":"book-chapter","created":{"date-parts":[[2020,8,12]],"date-time":"2020-08-12T12:05:28Z","timestamp":1597233928000},"page":"350-361","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Automated Security Driven Solution for Inter-Organizational Workflows"],"prefix":"10.1007","author":[{"given":"Asmaa","family":"El Kandoussi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hanan","family":"El Bakkali","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,8,13]]},"reference":[{"key":"35_CR1","unstructured":"Bouaziz, W., Andonoff, E.: Autonomic protocol-based coordination in dynamic inter-organizational workflow: HAL Id: hal-01233227 (2015)"},{"key":"35_CR2","doi-asserted-by":"crossref","unstructured":"El Kandoussi, A., El Bakkali, H.: On access control requirements for inter-organizational workflow. In: Proceedings of the 4th Edition of National Security Days, JNS4 2014 (2014)","DOI":"10.1109\/JNS4.2014.6850128"},{"issue":"1","key":"35_CR3","doi-asserted-by":"publisher","first-page":"237","DOI":"10.14254\/2071-8330.2017\/10-1\/17","volume":"10","author":"G Kov\u00e1cs","year":"2017","unstructured":"Kov\u00e1cs, G., Kot, S.: Economic and social effects of novel supply chain concepts and virtual enterprises. J. Int. Stud. 10(1), 237\u2013254 (2017)","journal-title":"J. Int. Stud."},{"issue":"3","key":"35_CR4","first-page":"462","volume":"10","author":"A El Kandoussi","year":"2018","unstructured":"El Kandoussi, A., El Bakkali, H.: Security based partner selection in inter-organizational workflow systems. Int. J. Commun. Networks Inf. Secur. 10(3), 462\u2013471 (2018)","journal-title":"Int. J. Commun. Networks Inf. Secur."},{"key":"35_CR5","unstructured":"Jatoth, C., Gangadharan, G.R., Fiore, U., Buyya, R.: SELCLOUD: a hybrid multi-criteria decision-making model for selection of cloud services. Soft Comput. 23, 1\u201315 (2018)"},{"issue":"10","key":"35_CR6","doi-asserted-by":"publisher","first-page":"1072","DOI":"10.1080\/0951192X.2017.1285424","volume":"30","author":"BL Sadigh","year":"2017","unstructured":"Sadigh, B.L., Nikghadam, S., Ozbayoglu, A.M., Unver, H.O., Dogdu, E., Kilic, S.E.: An ontology-based multi-agent virtual enterprise system (OMAVE): part 2: partner selection. Int. J. Comput. Integr. Manuf. 30(10), 1072\u20131092 (2017)","journal-title":"Int. J. Comput. Integr. Manuf."},{"issue":"1","key":"35_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.12785\/ijcds\/080101","volume":"8","author":"M Brahimi","year":"2019","unstructured":"Brahimi, M.: An agents\u2019 model using ontologies and web services for creating and managing virtual enterprises. Int. J. Comput. Digit. Syst. 8(1), 1\u20139 (2019)","journal-title":"Int. J. Comput. Digit. Syst."},{"issue":"3","key":"35_CR8","doi-asserted-by":"publisher","first-page":"323","DOI":"10.15388\/Informatica.2009.254","volume":"20","author":"E Andonoff","year":"2009","unstructured":"Andonoff, E., Bouaziz, W., Hanachi, C., Bouzguenda, L.: An agent-based model for autonomic coordination of inter-organizational business processes. Informatica 20(3), 323\u2013342 (2009)","journal-title":"Informatica"},{"key":"35_CR9","unstructured":"Sandhu, R.S.: Role-based access control. Adv. Comput. 46, 237\u2013286 (1998)"},{"issue":"6","key":"35_CR10","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1016\/S0306-4379(02)00029-7","volume":"28","author":"S Oh","year":"2003","unstructured":"Oh, S., Park, S.: Task\u2013role-based access control model. Inf. Syst. 28(6), 533\u2013562 (2003)","journal-title":"Inf. Syst."},{"key":"35_CR11","unstructured":"Ma, G.: A flexible policy-based access control model for workflow management systems (2011)"},{"key":"35_CR12","doi-asserted-by":"crossref","unstructured":"El Bakkali, H., Hatim, H.: RB-WAC: new approach for access control in workflows. In: 2009 IEEE\/ACS International Conference on Computer Systems and Applications, AICCSA 2009, pp. 637\u2013640 (2009)","DOI":"10.1109\/AICCSA.2009.5069394"},{"key":"35_CR13","doi-asserted-by":"crossref","unstructured":"Haguouche, S., Jarir, Z.: Towards a secure and borderless collaboration between organizations: an automated enforcement mechanism. Secur. Commun. Networks 2018, 13 (2018)","DOI":"10.1155\/2018\/1572812"},{"key":"35_CR14","unstructured":"Salehi, A., Rudolph, C., Grobler, M.: A dynamic cross-domain access control model for collaborative healthcare application. In: 2019 IFIP\/IEEE Symposium on Integrated Network and Service Management, IM 2019, pp. 643\u2013648 (2019)"},{"key":"35_CR15","unstructured":"Li, W.: A community cloud oriented workflow system framework and its scheduling strategy. In: Proceedings - 2010 Symposium on Web Society, SWS 2010, pp. 316\u2013325 (2010)"},{"key":"35_CR16","doi-asserted-by":"crossref","unstructured":"Alotaiby, F.T., Chen, J.X.: A model for team-based access control (TMAC 2004). In: International Conference Information Technology: Coding and Computing, ITCC, vol. 1, pp. 450\u2013454 (2004)","DOI":"10.1109\/ITCC.2004.1286497"},{"key":"35_CR17","doi-asserted-by":"crossref","unstructured":"Chakraborty, S., Ray, I.: TrustBAC - Integrating Trust Relationships into the RBAC Model for Access Control in Open Systems. In: Proceedings Eleventh ACM Symposium Access Control Models and Technologies - SACMAT 2006, p. 49 (2006)","DOI":"10.1145\/1133058.1133067"},{"issue":"1","key":"35_CR18","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/1057977.1057979","volume":"37","author":"W Tolone","year":"2005","unstructured":"Tolone, W., Ahn, G.-J., Pai, T., Hong, S.-P.: Access control in collaborative systems. ACM Comput. Surv. 37(1), 29\u201341 (2005)","journal-title":"ACM Comput. Surv."},{"key":"35_CR19","unstructured":"Andonoff, E., Bouzguenda, L.: Agent-based negotiation between partners in loose inter-organizational workflow. In: Proceedings - 2005 IEEE\/WIC\/ACM International Conference on Intelligent Agent Technology, IAT 2005, June 2014, vol. 2005, pp. 619\u2013625 (2005)"},{"issue":"11","key":"35_CR20","doi-asserted-by":"publisher","first-page":"1884","DOI":"10.1016\/j.infsof.2013.05.001","volume":"55","author":"W Hummer","year":"2013","unstructured":"Hummer, W., Gaubatz, P., Strembeck, M., Zdun, U., Dustdar, S.: Enforcement of entailment constraints in distributed service-based business processes. Inf. Softw. Technol. 55(11), 1884\u20131903 (2013)","journal-title":"Inf. Softw. Technol."},{"key":"35_CR21","unstructured":"Goel, A.: Specification and modelling of workflow management systems with state based access control (2016)"},{"key":"35_CR22","unstructured":"Mollahoseini Ardakani, M.R., Hashemi, S.M., Razzazi, M.: A cloud-based solution\/reference architecture for establishing collaborative networked organizations. J. Intell. Manuf. 30, 1\u201317 (2018)"},{"key":"35_CR23","doi-asserted-by":"crossref","unstructured":"Rizvi, S.S., Bolish, T.A., Pfeffer, J.R.: Security evaluation of cloud service providers using third party auditors. In: ACM International Conference Proceeding Series (2017)","DOI":"10.1145\/3018896.3025154"},{"key":"35_CR24","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1007\/978-3-319-19713-5_17","volume":"369","author":"H Rahimi","year":"2015","unstructured":"Rahimi, H., El Bakkali, H.: CIOSOS: combined idiomatic-ontology based sentiment orientation system for trust reputation in E-commerce. Adv. Intell. Syst. Comput. 369, 189\u2013200 (2015)","journal-title":"Adv. Intell. Syst. Comput."},{"issue":"3","key":"35_CR25","first-page":"136","volume":"8","author":"Z El Uahhabi","year":"2016","unstructured":"El Uahhabi, Z., El Bakkali, H.: Calculating and evaluating trustworthiness of certification authority. Int. J. Commun. Networks Inf. Secur. 8(3), 136\u2013146 (2016)","journal-title":"Int. J. Commun. Networks Inf. Secur."}],"container-title":["Advances in Intelligent Systems and Computing","Hybrid Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49336-3_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T17:15:40Z","timestamp":1696526140000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-49336-3_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,13]]},"ISBN":["9783030493356","9783030493363"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49336-3_35","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,13]]},"assertion":[{"value":"13 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Hybrid Intelligent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sehore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"his2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/his19\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}