{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:15:11Z","timestamp":1743023711996,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319125732"},{"type":"electronic","value":"9783319125749"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12574-9_1","type":"book-chapter","created":{"date-parts":[[2014,11,21]],"date-time":"2014-11-21T13:38:31Z","timestamp":1416577111000},"page":"3-15","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Ensuring Trustworthiness and Security in Service Compositions"],"prefix":"10.1007","author":[{"given":"Vasilios","family":"Tountopoulos","sequence":"first","affiliation":[]},{"given":"Ira","family":"Giannakoudaki","sequence":"additional","affiliation":[]},{"given":"Konstantinos","family":"Giannakakis","sequence":"additional","affiliation":[]},{"given":"Lefteris","family":"Korres","sequence":"additional","affiliation":[]},{"given":"Leonidas","family":"Kallipolitis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,18]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Meland, P.H., Guerenabarrena, J.B., Llewellyn-Jones, D.: The challenges of secure and trustworthy service composition in the Future Internet. In: 2011 6th International Conference on Proceeding of System of Systems Engineering (SoSE). IEEE Computer Society (2011)","DOI":"10.1109\/SYSOSE.2011.5966619"},{"key":"1_CR2","unstructured":"FP7-257930 Aniketos project. www.aniketos.eu"},{"key":"1_CR3","unstructured":"Georgia Institute of Technology, \u201cEmerging Cyber Threats Report 2014\u201d. Georgia Tech Cyber Security Summit 2013"},{"key":"1_CR4","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1016\/j.datak.2012.12.005","volume":"87","author":"E Pajaa","year":"2013","unstructured":"Pajaa, E., Choprab, A.K., Giorgini, P.: Trust-based specification of sociotechnical systems. Data Knowl. Eng. 87, 339\u2013353 (2013). doi:10.1016\/j.datak.2012.12.005. Elsevier","journal-title":"Data Knowl. Eng."},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-642-41924-9_23","volume-title":"Conceptual Modeling","author":"E Paja","year":"2013","unstructured":"Paja, E., Dalpiaz, F., Giorgini, P.: Managing security requirements conflicts in socio-technical systems. In: Ng, W., Storey, V.C., Trujillo, J.C. (eds.) ER 2013. LNCS, vol. 8217, pp. 270\u2013283. Springer, Heidelberg (2013)"},{"key":"1_CR6","unstructured":"Object Management Group(OMG), Business Process Modelling and Notation (BPMN) specification v2.0, January 2011. www.bpmn.org"},{"key":"1_CR7","doi-asserted-by":"publisher","unstructured":"Brucker, A.D., Malmignati, F., Merabti, M., Qi, S., Bo, Z.: A Framework for Secure Service Composition. In: Proceedings of the International Conference on Social Computing 2013 (SocialCom), IEEE, pp. 647\u2013652, doi:10.1109\/SocialCom.2013.97","DOI":"10.1109\/SocialCom.2013.97"},{"key":"1_CR8","doi-asserted-by":"publisher","unstructured":"Ayed, D., Asim, M., Llewellyn-Jones, D.: An event processing approach for threats monitoring of service compositions. In: Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), IEEE, pp. 1\u201310, doi:10.1109\/CRiSIS.2013.6766363","DOI":"10.1109\/CRiSIS.2013.6766363"},{"key":"1_CR9","volume-title":"OSGi in Action","author":"RS Hall","year":"2011","unstructured":"Hall, R.S., Pauls, K., McCulloch, S., Savage, D.: OSGi in Action. Manning Publications Co., Greenwich (2011)"},{"key":"1_CR10","volume-title":"Enterprise OSGi in Action","author":"H Cummins","year":"2013","unstructured":"Cummins, H., Ward, T.: Enterprise OSGi in Action. Manning Publications Co., Birmingham (2013)"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Dalpiaz, F., Paja, E., Giorgini, P.: Security requirements engineering via commitments. In: Proceedings of STAST\u201911, pp. 1\u20138 (2011)","DOI":"10.1109\/STAST.2011.6059249"},{"key":"1_CR12","doi-asserted-by":"publisher","unstructured":"Brucker, A.D.: Integrating security aspects into business process models. IT Inf. Technol. 55(6), 239\u2013246 (2013). ISSN: 2196-7032. doi:10.1524\/itit.2013.2004. http:\/\/www.brucker.ch\/bibliography\/abstract\/brucker-securebpmn-2013. Special Issue on Security in Business Processes","DOI":"10.1524\/itit.2013.2004"}],"container-title":["Communications in Computer and Information Science","Cyber Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12574-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T01:02:44Z","timestamp":1676422964000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12574-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319125732","9783319125749"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12574-9_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"18 November 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}