{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T23:10:10Z","timestamp":1746313810014,"version":"3.40.4"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319094915"},{"type":"electronic","value":"9783319094922"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09492-2_14","type":"book-chapter","created":{"date-parts":[[2014,7,24]],"date-time":"2014-07-24T11:33:31Z","timestamp":1406201611000},"page":"226-241","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Foundation for Fine-Grained Security and DRM Control Based on a Service Call Graph Context Identification"],"prefix":"10.1007","author":[{"given":"Ziyi","family":"Su","sequence":"first","affiliation":[]},{"given":"Fr\u00e9d\u00e9rique","family":"Biennier","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,25]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Bussard, L., Neven, G., Preiss, F.-S.: Downstream usage control. In: 11th IEEE International Symposium on Policies for Distributed Systems and Networks, pp. 22\u201329. IEEE Computer Society, Washington, DC (2010)","DOI":"10.1109\/POLICY.2010.17"},{"key":"14_CR2","unstructured":"Daniele, C., Giles, H.: Cloud computing: benefits, risks and recommendations for information security. Technical report, European Network and Information Security Agency (2009)"},{"key":"14_CR3","unstructured":"GrammaTech.: Dependence graphs and program slicing-codesurfer technology overview. Technical report, GrammaTech Inc."},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Gu, L., Ding, X., Deng, R.H., Xie, B., Mei, H.: Remote attestation on program execution. In: 3rd ACM Workshop on Scalable Trusted Computing, pp. 11\u201320. ACM, New York (2008)","DOI":"10.1145\/1456455.1456458"},{"key":"14_CR5","unstructured":"Kagal, L., Abelson, H.: Access control is an inadequate framework for privacy protection. In: W3C Privacy Workshop. W3C (2010)"},{"key":"14_CR6","unstructured":"Linda, B.B., Richard, C., Kristin, L., Ric, T., Mark, E.: The evolving role of IT managers and CIOs\u2013findings from the 2010 IBM global IT risk study. Technical report, IBM (2010)"},{"key":"14_CR7","unstructured":"OASIS: eXtensible Access Control Markup Language (XACML) version 2.0 (2005). http:\/\/docs.oasis-open.org\/xacml\/2.0\/"},{"key":"14_CR8","unstructured":"OASIS: Web Services Business Process Execution Language (WS-BPEL) (2007). http:\/\/docs.oasis-open.org\/wsbpel\/2.0\/wsbpel-v2.0.html"},{"key":"14_CR9","unstructured":"Park, J., Sandhu, R.: Originator control in usage control. In: 3rd International Workshop on Policies for Distributed Systems and Networks, pp. 60\u201366. IEEE Computer Society, Washington, DC (2002)"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Su, Z., Biennier, F.: End-to-end security policy description and management for collaborative system. In: 6th International Conference on Information Assurance and Security, pp. 137\u2013142 (2010)","DOI":"10.1109\/ISIAS.2010.5604183"},{"key":"14_CR11","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1007\/978-3-642-33980-6_39","volume-title":"Advances in Production Management Systems","author":"Z Su","year":"2012","unstructured":"Su, Z., Biennier, F.: Toward comprehensive security policy governance in collaborative enterprise. In: Frick, J., Laugen, B.T. (eds.) APMS 2011. IFIP AICT, vol. 384, pp. 350\u2013358. Springer, Heidelberg (2012)"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Su, Z., Biennier, F.: Service Call Graph (SCG)-information flow analysis in Web service composition. In: 15th International Conference on Enterprise Information Systems, pp. 17\u201324. SciTePress (2013)","DOI":"10.5220\/0004401900170024"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Zhang, X., Li, Y., Nalla, D.: An attribute-based access matrix model. In: 20th ACM Symposium on Applied Computing, pp. 359\u2013363. ACM, Santa Fe, NM (2005)","DOI":"10.1145\/1066677.1066760"},{"key":"14_CR14","unstructured":"Zhao, J., Rinard, M.: System dependence graph construction for aspect-oriented programs. Technical report MIT-LCS-TR-891, Laboratory for Computer Science. MIT (2003)"}],"container-title":["Lecture Notes in Business Information Processing","Enterprise Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09492-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T22:44:22Z","timestamp":1746312262000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-09492-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319094915","9783319094922"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09492-2_14","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"25 July 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}