{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T03:37:42Z","timestamp":1743046662959,"version":"3.40.3"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030588168"},{"type":"electronic","value":"9783030588175"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58817-5_63","type":"book-chapter","created":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T15:03:56Z","timestamp":1601391836000},"page":"895-909","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Some Means Supporting Responsibility and Openness in Information and Control Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0951-0272","authenticated-orcid":false,"given":"Michal","family":"\u017demli\u010dka","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3161-0568","authenticated-orcid":false,"given":"Jaroslav","family":"Kr\u00e1l","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,30]]},"reference":[{"key":"63_CR1","unstructured":"Aho, A.V., Ullman, J.D.: The Theory of Parsing, Translation and Compiling, Vol. I.: Parsing. Prentice-Hall, Englewood Cliffs (1972)"},{"key":"63_CR2","unstructured":"Aho, A.V., Ullman, J.D.: The Theory of Parsing, Translation and Compiling, Vol. II.: Compiling. Prentice-Hall, Englewood Cliffs (1973)"},{"key":"63_CR3","unstructured":"Andrews, T., et al.: Specification: Business process execution language for web services version 1.1 (2003). http:\/\/www-106.ibm.com\/developerworks\/library\/ws-bpel\/. Last Accessed Jan 2005"},{"key":"63_CR4","volume-title":"Software Engineering Economics","author":"BW Boehm","year":"1981","unstructured":"Boehm, B.W.: Software Engineering Economics. Prentice Hall, Upper Saddle River (1981)"},{"key":"63_CR5","volume-title":"Software Cost Estimation With COCOMO II","author":"BW Boehm","year":"2000","unstructured":"Boehm, B.W., et al.: Software Cost Estimation With COCOMO II. Prentice Hall, Upper Saddle River (2000)"},{"key":"63_CR6","unstructured":"Brown, P., Estefan, J.A., Laskey, K., McCabe, F.G., Thornton, D.: Reference architecture foundation for service oriented architecture version 1.0, December 2012. http:\/\/docs.oasis-open.org\/soa-rm\/soa-ra\/v1.0\/cs01\/soa-ra-v1.0-cs01.pdf"},{"key":"63_CR7","unstructured":"Business Process Management Initiative: Business process modelling notation (2004). http:\/\/www.bpmn.org\/"},{"issue":"3","key":"63_CR8","doi-asserted-by":"publisher","first-page":"359","DOI":"10.24846\/v27i3y201811","volume":"27","author":"CE C\u00eernu","year":"2018","unstructured":"C\u00eernu, C.E., Rotun\u01ce, C.I., Vevera, A.V., Boncea, R.: Measures to mitigate cybersecurity risks and vulnerabilities in service-oriented architecture. Stud. Inform. Control 27(3), 359\u2013368 (2018)","journal-title":"Stud. Inform. Control"},{"key":"63_CR9","volume-title":"Service-Oriented Architecture: Concepts, Technology, and Design","author":"T Erl","year":"2005","unstructured":"Erl, T.: Service-Oriented Architecture: Concepts, Technology, and Design. Prentice Hall, Upper Saddle River (2005)"},{"key":"63_CR10","volume-title":"Design Patterns Elements of Reusable Object-Orieneted Software","author":"E Gamma","year":"1993","unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns Elements of Reusable Object-Orieneted Software. Addison-Wesley, Boston (1993)"},{"issue":"1","key":"63_CR11","first-page":"51","volume":"31","author":"S Geri\u0107","year":"2007","unstructured":"Geri\u0107, S., Hutinski, \u017d.: Information system security threats classifications. J. Inf. Organ. Sci. 31(1), 51\u201361 (2007)","journal-title":"J. Inf. Organ. Sci."},{"key":"63_CR12","doi-asserted-by":"publisher","unstructured":"Grune, D., van Reeuwijk, K., Bal, H.E., Jacobs, C.J.H., Langendoen, K.: Modern Compiler Design, Second edn. Springer, New York (2012). https:\/\/doi.org\/10.1007\/978-1-4614-4699-6","DOI":"10.1007\/978-1-4614-4699-6"},{"key":"63_CR13","doi-asserted-by":"publisher","unstructured":"Hasselbring, W., Steinacker, G.: Microservice architectures for scalability, agility and reliability in e-commerce. In: 2017 IEEE International Conference on Software Architecture Workshops (ICSAW), pp. 243\u2013246 (2017). https:\/\/doi.org\/10.1109\/ICSAW.2017.11","DOI":"10.1109\/ICSAW.2017.11"},{"key":"63_CR14","unstructured":"IDS Scheer: Aris process platform. http:\/\/www.ids-scheer.com\/international\/english\/products\/31207"},{"key":"63_CR15","unstructured":"International Organization for Standardization, International Electrotechnical Commission: ISO\/IEC 25010:2011 systems and software engineering - systems and software quality requirements and evaluation (SQuaRE) - system and software quality models (2011). https:\/\/www.iso.org\/obp\/ui\/#iso:std:iso-iec:25010:ed-1:v1:en"},{"key":"63_CR16","doi-asserted-by":"publisher","unstructured":"Jouini, M., Rabai, L.B.A., Aissa, A.B.: Classification of security threats in information systems. In: The 5th International Conference on Ambient Systems, Networks and Technologies (ANT-2014), the 4th International Conference on Sustainable Energy Information Technology (SEIT-2014). Procedia Computer Science, vol. 32, pp. 489\u2013496 (2014). https:\/\/doi.org\/10.1016\/j.procs.2014.05.452, http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1877050914006528","DOI":"10.1016\/j.procs.2014.05.452"},{"key":"63_CR17","doi-asserted-by":"crossref","unstructured":"Kr\u00e1l, J., Demner, J.: Towards reliable real time software. In: Proceedings of IFIP Conference Construction of Quality Software, pp. 1\u201312. North Holland (1979)","DOI":"10.1016\/S1474-6670(17)65794-X"},{"key":"63_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-319-62407-5_12","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2017","author":"J Kr\u00e1l","year":"2017","unstructured":"Kr\u00e1l, J., Nov\u00e1k, P., \u017demli\u010dka, M.: A system based on intelligent documents. In: Gervasi, O., et al. (eds.) ICCSA 2017. LNCS, vol. 10409, pp. 176\u2013187. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-62407-5_12"},{"key":"63_CR19","doi-asserted-by":"publisher","unstructured":"Kr\u00e1l, J., \u017demli\u010dka, M.: Electronic government and software confederations. In: Tjoa, A.M., Wagner, R.R. (eds.) Twelfth International Workshop on Database and Experts System Application, pp. 383\u2013387. IEEE Computer Society, Los Alamitos (2001). https:\/\/doi.org\/10.1109\/DEXA.2001.953091","DOI":"10.1109\/DEXA.2001.953091"},{"key":"63_CR20","first-page":"125","volume-title":"Applied Informatics","author":"J Kr\u00e1l","year":"2002","unstructured":"Kr\u00e1l, J., \u017demli\u010dka, M.: Component types in software confederations. In: Hamza, M.H. (ed.) Applied Informatics, pp. 125\u2013130. ACTA Press, Anaheim (2002)"},{"key":"63_CR21","doi-asserted-by":"publisher","unstructured":"Kr\u00e1l, J., \u017demli\u010dka, M.: Implementation of business processes in service-oriented systems. In: 2005 IEEE International Conference on Services Computing (SCC 2005), vol. 2, pp. 115\u2013122. IEEE Computer Society (2005). https:\/\/doi.org\/10.1109\/SCC.2005.58","DOI":"10.1109\/SCC.2005.58"},{"key":"63_CR22","doi-asserted-by":"publisher","unstructured":"Kr\u00e1l, J., \u017demli\u010dka, M.: Software architecture for evolving environment. In: Kontogiannis, K., Zou, Y., Penta, M.D. (eds.) 13th IEEE International Workshop on Software Technology and Engineering Practice, pp. 49\u201358. IEEE Computer Society, Los Alamitos (2006). https:\/\/doi.org\/10.1109\/STEP.2005.25","DOI":"10.1109\/STEP.2005.25"},{"key":"63_CR23","doi-asserted-by":"publisher","unstructured":"Kr\u00e1l, J., \u017demli\u010dka, M.: Usability issues in service-oriented architecture. In: Cardoso, J., Cordeiro, J., Filipe, J. (eds.) ICEIS 2007: Proceedings of the Ninth International Conference on Enterprise Information Systems, vol. DISI, pp. 482\u2013485. EST Set\u00fabal, Set\u00fabal (2007). https:\/\/doi.org\/10.5220\/0002387704820485","DOI":"10.5220\/0002387704820485"},{"issue":"3","key":"63_CR24","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1504\/IJBPIM.2008.023220","volume":"3","author":"J Kr\u00e1l","year":"2008","unstructured":"Kr\u00e1l, J., \u017demli\u010dka, M.: Implementation of business processes in service-oriented systems. Int. J. Bus. Process Integr. Manage. 3(3), 208\u2013219 (2008). https:\/\/doi.org\/10.1504\/IJBPIM.2008.023220","journal-title":"Int. J. Bus. Process Integr. Manage."},{"key":"63_CR25","doi-asserted-by":"publisher","unstructured":"Kr\u00e1l, J., \u017demli\u010dka, M.: Inaccessible area and effort consumption dynamics. In: Dosch, W., Lee, R., Tuma, P., Coupaye, T. (eds.) Proceedings of 6th International Conference on Software Engineering Research, Management and Applications (SERA 2008), pp. 229\u2013234. IEEE CS Press, Los Alamitos (2008). https:\/\/doi.org\/10.1109\/SERA.2008.27","DOI":"10.1109\/SERA.2008.27"},{"key":"63_CR26","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16419-4","volume-title":"ENTERprise Information Systems","year":"2010","unstructured":"Quintela Varaj\u00e3o, J.E., Cruz-Cunha, M.M., Putnik, G.D., Trigo, A. (eds.): CENTERIS 2010. CCIS, vol. 110. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-16419-4"},{"key":"63_CR27","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-030-31967-0_5","volume-title":"Advances in Harmony Search, Soft Computing and Applications","author":"Z Li","year":"2020","unstructured":"Li, Z., Liu, K.: An event based detection of internal threat to information system. In: Kim, J.H., Geem, Z.W., Jung, D., Yoo, D.G., Yadav, A. (eds.) ICHSA 2019. AISC, vol. 1063, pp. 44\u201353. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-31967-0_5"},{"key":"63_CR28","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1037\/h0043158","volume":"63","author":"GA Miller","year":"1956","unstructured":"Miller, G.A.: The magical number seven, plus or minus two: some limits on our capacity for processing information. Psychol. Rev. 63, 81\u201397 (1956). https:\/\/doi.org\/10.1037\/h0043158","journal-title":"Psychol. Rev."},{"key":"63_CR29","unstructured":"Open Group: Open Group standard SOA reference architecture, November 2011. https:\/\/www2.opengroup.org\/ogsys\/jsp\/publications\/PublicationDetails.jsp?publicationid=12490"},{"issue":"2","key":"63_CR30","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1109\/TSE.1979.234169","volume":"5","author":"DL Parnas","year":"1979","unstructured":"Parnas, D.L.: Designing software for ease of extension and contraction. IEEE Trans. Softw. Eng. 5(2), 128\u2013138 (1979). https:\/\/doi.org\/10.1109\/TSE.1979.234169","journal-title":"IEEE Trans. Softw. Eng."},{"key":"63_CR31","unstructured":"Pokorn\u00fd, J.: Workflow management systems: a survey of possibilities. In: Coelho, J.D., Jelassi, T., K\u00f6nig, W., Krcmar, H., O\u2019Callaghan, R., S\u00e4\u00e4ksj\u00e4rvi, M. (eds.) Proceedings of the Fourth EuropeanConference on Information Systems. ECIS1996, Lisbon, Portugal, pp. 253\u2013264 (1996)"},{"issue":"5","key":"63_CR32","doi-asserted-by":"publisher","first-page":"8","DOI":"10.5120\/ijca2016910160","volume":"143","author":"O Safianu","year":"2016","unstructured":"Safianu, O., Twum, F., Hayfron-Acquah, J.B.: Information system security threats and vulnerabilities: evaluating the human factor in data protection. Int. J. Comput. Appl. 143(5), 8\u201314 (2016). https:\/\/doi.org\/10.5120\/ijca2016910160","journal-title":"Int. J. Comput. Appl."},{"issue":"3","key":"63_CR33","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MS.2018.2141031","volume":"35","author":"D Taibi","year":"2018","unstructured":"Taibi, D., Lenarduzzi, V.: On the definition of microservice bad smells. IEEE Softw. 35(3), 56\u201362 (2018)","journal-title":"IEEE Softw."},{"key":"63_CR34","unstructured":"W3 Consortium: XSL transformations (XSLT) version 2.0, January 2007. http:\/\/www.w3.org\/TR\/xslt20"},{"key":"63_CR35","unstructured":"W3 Consortium: Web of services (2015). https:\/\/www.w3.org\/standards\/webofservices\/"},{"key":"63_CR36","unstructured":"W3 Consortium: XML path language (XPath) version 3.1, March 2017. https:\/\/www.w3.org\/TR\/xpath\/"},{"key":"63_CR37","unstructured":"Weinberg, V.: Structured analysis. Prentice-Hall software series, Prentice-Hall, Englewood Cliffs (1979)"},{"key":"63_CR38","unstructured":"WFMC: Workflow management coalition home page (1993). http:\/\/www.wfmc.org\/"},{"key":"63_CR39","unstructured":"Wilhelm, R., Maurer, D.: Compiler Design. International Computer Science, Addison-Wesley, Wokingham (1995)"},{"key":"63_CR40","unstructured":"Workflow Management Coalition: Workflow specification (2004). http:\/\/www.wfmc.org\/standards\/docs\/Wf-XML-11.pdf"},{"key":"63_CR41","volume-title":"Modern Structured Analysis","author":"E Yourdon","year":"1988","unstructured":"Yourdon, E.: Modern Structured Analysis, 2nd edn. Prentice-Hall, Upper Saddle River (1988)","edition":"2"},{"key":"63_CR42","unstructured":"Zanella, G.L., Pinasco, M.: Deliverable d8.1: Requirements for the integration layer (Sep 2016). http:\/\/www.in2rail.eu\/download.aspx?id=aef8ad3a-8581-4f56-be5c-77d6329dd7f4"},{"key":"63_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1007\/978-3-030-24308-1_43","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2019","author":"M \u017demli\u010dka","year":"2019","unstructured":"\u017demli\u010dka, M., Kr\u00e1l, J.: Software architecture enabling effective control of selected quality aspects. In: Misra, S., et al. (eds.) ICCSA 2019. LNCS, vol. 11623, pp. 536\u2013550. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-24308-1_43"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2020"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58817-5_63","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T15:04:21Z","timestamp":1619190261000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58817-5_63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030588168","9783030588175"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58817-5_63","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"30 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cagliari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Cyber chair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1450","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"466","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Conference was held virtually due to COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}