{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:31:08Z","timestamp":1743021068609,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319018560"},{"type":"electronic","value":"9783319018577"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-01857-7_67","type":"book-chapter","created":{"date-parts":[[2013,8,7]],"date-time":"2013-08-07T07:47:00Z","timestamp":1375861620000},"page":"701-714","source":"Crossref","is-referenced-by-count":0,"title":["Decision Making in Security Level Evaluation Process of Service-Based Applications in Future Internet Architecture"],"prefix":"10.1007","author":[{"given":"Grzegorz","family":"Ko\u0142aczek","sequence":"first","affiliation":[]},{"given":"Krzysztof","family":"Juszczyszyn","sequence":"additional","affiliation":[]},{"given":"Pawe\u0142","family":"\u015awi\u0105tek","sequence":"additional","affiliation":[]},{"given":"Adam","family":"Grzech","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"67_CR1","unstructured":"CERT (2009), \n                    http:\/\/www.cert.org\n                   (retrieved March 20, 2009)"},{"issue":"1","key":"67_CR2","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MSP.2006.23","volume":"4","author":"J. Epstein","year":"2006","unstructured":"Epstein, J., Matsumoto, S., McGraw, G.: Software security and SOA. IEEE Security and Privacy\u00a04(1), 80\u201383 (2006)","journal-title":"IEEE Security and Privacy"},{"key":"67_CR3","doi-asserted-by":"crossref","unstructured":"Fernandez, E.B., Delessy, N.: Using patterns to understand and compare web services security products and standards (2006)","DOI":"10.1109\/AICT-ICIW.2006.202"},{"key":"67_CR4","unstructured":"Kolaczek, G.: Opracowanie koncepcji specyfikacji metod i modeli szacowania poziomu bezpiecze\u0144stwa system\u00f3w SOA i SOKU, WUT (2009) (in polish)"},{"key":"67_CR5","doi-asserted-by":"crossref","unstructured":"Nakamura, Y., Tatsubori, M., Imamura, T., Ono, K.: Model-driven security based on web services security architecture. In: IEEE International Conference on Services Computing, vol.\u00a01, pp. 7\u201315 (2005)","DOI":"10.1109\/SCC.2005.66"},{"key":"67_CR6","unstructured":"SANS Institute (2006), \n                    http:\/\/www.sans.org\n                   (retrieved March 20, 2009)"},{"key":"67_CR7","doi-asserted-by":"crossref","unstructured":"Skalka, C., Wang, X.: Trust by verify: Authorization for web services. Paper presented in ACM Workshop on Secure Web Services, pp. 47\u201355 (2004)","DOI":"10.1145\/1111348.1111354"},{"key":"67_CR8","unstructured":"SOA Reference Model Technical Committee. A Reference Model for Service Oriented Architecture, OASIS (2006)"},{"key":"67_CR9","volume-title":"Core security patterns: Best practices and strategies for J2EE, web services, and identity management","author":"C. Steel","year":"2006","unstructured":"Steel, C., Nagappan, R., Lai, R.: Core security patterns: Best practices and strategies for J2EE, web services, and identity management. Pearson, Upper Saddle River (2006)"},{"issue":"1","key":"67_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jwsr.2006010101","volume":"3","author":"Z. Tari","year":"2006","unstructured":"Tari, Z., Bertok, P., Simic, D.: A dynamic label checking approach for information flow control in web services. International Journal of Web Services Research\u00a03(1), 1\u201328 (2006)","journal-title":"International Journal of Web Services Research"},{"issue":"1","key":"67_CR11","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1080\/01969720903408797","volume":"41","author":"G. Kolaczek","year":"2010","unstructured":"Kolaczek, G., Juszczyszyn, K.: Smart Security Assessment of Composed Web Services. Cybernetics and Systems\u00a041(1), 46\u201361 (2010)","journal-title":"Cybernetics and Systems"},{"issue":"3","key":"67_CR12","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1142\/S0218488501000831","volume":"9","author":"A. J\u00f8sang","year":"2001","unstructured":"J\u00f8sang, A.: A Logic for Uncertain Probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems\u00a09(3), 279\u2013311 (2001)","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"67_CR13","unstructured":"J\u00f8sang, A.: A Metric for Trusted Systems. In: Proceedings of the 21st National Security Conference, NSA, pp. 68\u201377 (1998)"},{"key":"67_CR14","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A.: Conditional Inference in Subjective Logic. In: The Proceedings of the 6th International Conference on Information Fusion, Cairns, pp. 279\u2013311 (2003)","DOI":"10.1109\/ICIF.2003.177484"},{"key":"67_CR15","unstructured":"Anderson, S., Grau, A., Hughes, C.: Specification and satisfaction of SLAs in service oriented architectures. In: 5th Annual DIRC Research Conference, pp. 141\u2013150 (2005)"},{"issue":"6","key":"67_CR16","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MIC.2004.58","volume":"8","author":"N. Milanovic","year":"2004","unstructured":"Milanovic, N., Malek, M.: Current Solutions for Web Service Composition. IEEE Internet Computing\u00a08(6), 51\u201359 (2004)","journal-title":"IEEE Internet Computing"},{"key":"67_CR17","unstructured":"Frolund, S., Koisten, J.: QML: A language for quality of service specification (1998), \n                    http:\/\/www.hpl.hp.com\/techreports\/98\/HPL-98-10.html"},{"key":"67_CR18","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.entcs.2005.11.005","volume":"146","author":"Y. Charif","year":"2006","unstructured":"Charif, Y., Sabouret, N.: An Overview of Semantic Web Services Composition Approaches. Electronic Notes in Theoretical Computer Science\u00a0146, 33\u201341 (2006)","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"67_CR19","unstructured":"Salvador, S., Chan, P.: Learning states and rules for time-series anomaly detection. Tech. rep., 2008 CS\u20132003\u201305, Department of Computer Science, Florida Institute of Technology Melbourne (2003)"},{"issue":"4","key":"67_CR20","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1142\/S0129065795000251","volume":"6","author":"A.S. Weigend","year":"1995","unstructured":"Weigend, A.S., Mangeas, M., Srivastava, A.N.: Nonlinear gated experts for time-series: Discovering regimes and avoiding overfitting. Int. J. Neural Syst.\u00a06(4), 373\u2013399 (1995)","journal-title":"Int. J. Neural Syst."},{"key":"67_CR21","series-title":"Lecture Notes in Artificial Intelligence","first-page":"1185","volume-title":"MICAI 2005: Advances in Artificial Intelligence","author":"J. Noguez","year":"2005","unstructured":"Noguez, J., Sucar, L.E.: A Semi-open Learning Environment for Virtual Laboratories. In: Gelbukh, A., de Albornoz, \u00c1., Terashima-Mar\u00edn, H. (eds.) MICAI 2005. LNCS (LNAI), vol.\u00a03789, pp. 1185\u20131194. Springer, Heidelberg (2005)"},{"key":"67_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/11808107_10","volume-title":"Dependable Systems: Software, Computing, Networks","author":"C. Pautasso","year":"2006","unstructured":"Pautasso, C., Bausch, W., Alonso, G.: Autonomic Computing for Virtual Laboratories. In: Kohlas, J., Meyer, B., Schiper, A. (eds.) Dependable Systems. LNCS, vol.\u00a04028, pp. 211\u2013230. Springer, Heidelberg (2006)"},{"key":"67_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/978-3-642-20039-7_37","volume-title":"Intelligent Information and Database Systems","author":"K. Juszczyszyn","year":"2011","unstructured":"Juszczyszyn, K., Paprocki, M., Prusiewicz, A., Sieniawski, L.: Personalization and content awareness in online lab \u2013 virtual computational laboratory. In: Nguyen, N.T., Kim, C.-G., Janiak, A. (eds.) ACIIDS 2011, Part I. LNCS, vol.\u00a06591, pp. 367\u2013376. Springer, Heidelberg (2011)"},{"key":"67_CR24","doi-asserted-by":"crossref","unstructured":"Blake, S., et al.: An architecture for differentiated services. RFC2475 (1998)","DOI":"10.17487\/rfc2475"},{"key":"67_CR25","unstructured":"Burakowski, W., et al.: The Future Internet Engineering Project in Poland: Goals and Achievements. In: Future Internet Poland Conference, Poznan, Poland (October 2011)"},{"issue":"5","key":"67_CR26","doi-asserted-by":"publisher","first-page":"862","DOI":"10.1016\/j.comnet.2009.10.017","volume":"54","author":"N.M. Mosharaf Kabir Chowdhury","year":"2010","unstructured":"Mosharaf Kabir Chowdhury, N.M., Boutaba, R.: A survey of network virtualization. Computer Networks: The International Journal of Computer and Telecommunications Networking\u00a054(5), 862\u2013876 (2010)","journal-title":"Computer Networks: The International Journal of Computer and Telecommunications Networking"},{"key":"67_CR27","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1080\/01969722.2010.520225","volume":"41","author":"A. Grzech","year":"2010","unstructured":"Grzech, A., Rygielski, P., \u015awi\u0105tek, P.: Translations of Service Level Agreement in Systems Based on Service-Oriented Architectures. Cyb. and Systems\u00a041, 610\u2013627 (2010)","journal-title":"Cyb. and Systems"},{"key":"67_CR28","unstructured":"ITU-T Rec. Y. Functional requirements and architecture of next generation networks (2012)"},{"key":"67_CR29","doi-asserted-by":"crossref","unstructured":"Tarasiuk, H., et al.: Provision of End-to-End QoS in Heterogeneous Multi-Domain Networks. Annals of Telecommunications\u00a063(11) (2008)","DOI":"10.1007\/s12243-008-0060-3"},{"key":"67_CR30","first-page":"12","volume":"3","author":"H. Tarasiuk","year":"2011","unstructured":"Tarasiuk, H., et al.: Performance Evaluation of Signaling in the IP QoS System. Journal of Telecommunications and Information Technology\u00a03, 12\u201320 (2011)","journal-title":"Journal of Telecommunications and Information Technology"},{"key":"67_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/978-3-642-23863-5_60","volume-title":"Knowlege-Based and Intelligent Information and Engineering Systems","author":"P. Rygielski","year":"2011","unstructured":"Rygielski, P., Tomczak, J.M.: Context Change Detection for Resource Allocation in Service-Oriented Systems. In: K\u00f6nig, A., Dengel, A., Hinkelmann, K., Kise, K., Howlett, R.J., Jain, L.C. (eds.) KES 2011, Part II. LNCS, vol.\u00a06882, pp. 591\u2013600. Springer, Heidelberg (2011)"},{"issue":"3","key":"67_CR32","first-page":"25","volume":"36","author":"P. Rygielski","year":"2010","unstructured":"Rygielski, P., \u015awi\u0105tek, P.: Graph-fold: an efficient method for complex service execution plan optimization. Systems Science\u00a036(3), 25\u201332 (2010)","journal-title":"Systems Science"},{"issue":"2\/3","key":"67_CR33","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/s00354-012-0204-x","volume":"30","author":"P. \u015awi\u0105tek","year":"2012","unstructured":"\u015awi\u0105tek, P., Stelmach, P., Prusiewicz, A., Juszczyszyn, K.: Service composition in knowledge-based SOA systems. New Generation Computing\u00a030(2\/3), 165\u2013188 (2012)","journal-title":"New Generation Computing"},{"issue":"4","key":"67_CR34","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1080\/01969722.2012.678219","volume":"43","author":"P. \u015awi\u0105tek","year":"2012","unstructured":"\u015awi\u0105tek, P., Rygielski, P., Juszczyszyn, K., Grzech, A.: User assignment and movement prediction in wireless networks. Cybernetics and Systems\u00a043(4), 340\u2013353 (2012)","journal-title":"Cybernetics and Systems"},{"key":"67_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-642-30241-1_14","volume-title":"The Future Internet","author":"P. \u015awi\u0105tek","year":"2012","unstructured":"\u015awi\u0105tek, P., Juszczyszyn, K., Brzostowski, K., Drapa\u0142a, J., Grzech, A.: Supporting content, context and user awareness in Future Internet applications. In: \u00c1lvarez, F., et al. (eds.) FIA 2012. LNCS, vol.\u00a07281, pp. 154\u2013165. Springer, Heidelberg (2012)"},{"key":"67_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/978-3-642-23935-9_55","volume-title":"Computational Collective Intelligence. Technologies and Applications","author":"M. Fra\u015b","year":"2011","unstructured":"Fra\u015b, M., Grzech, A., Juszczyszyn, K., Ko\u0142aczek, G., Kwiatkowski, J., Prusiewicz, A., Sobecki, J., \u015awi\u0105tek, P., Wasilewski, A.: Smart Work Workbench: Integrated tool for IT services planning, management, execution and evaluation. In: J\u0119drzejowicz, P., Nguyen, N.T., Hoang, K. (eds.) ICCCI 2011, Part I. LNCS, vol.\u00a06922, pp. 557\u2013571. Springer, Heidelberg (2011)"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Systems Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-01857-7_67","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T15:12:10Z","timestamp":1676819530000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-01857-7_67"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319018560","9783319018577"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-01857-7_67","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}