{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T16:19:51Z","timestamp":1725812391194},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319135175"},{"type":"electronic","value":"9783319135182"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13518-2_15","type":"book-chapter","created":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T05:51:00Z","timestamp":1417413060000},"page":"219-233","source":"Crossref","is-referenced-by-count":0,"title":["Supporting Security and Trust in Complex e-Government Services"],"prefix":"10.1007","author":[{"given":"Vasilis","family":"Tountopoulos","sequence":"first","affiliation":[]},{"given":"Ira","family":"Giannakoudaki","sequence":"additional","affiliation":[]},{"given":"Konstantinos","family":"Giannakakis","sequence":"additional","affiliation":[]},{"given":"Lefteris","family":"Korres","sequence":"additional","affiliation":[]},{"given":"Leonidas","family":"Kallipolitis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Meland, P.H., Guerenabarrena, J.B., Llewellyn-Jones, D.: The challenges of secure and trustworthy service composition in the Future Internet. In: Proceeding of 2011 6th International Conference on System of Systems Engineering (SoSE). IEEE Computer Society (2011)","DOI":"10.1109\/SYSOSE.2011.5966619"},{"key":"15_CR2","unstructured":"Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal L 281, 0031\u20130050 (November 23, 1995)"},{"key":"15_CR3","unstructured":"EIF - European Interoperability Framework for pan-European eGovernment services, \n                    \n                      http:\/\/ec.europa.eu\/idabc"},{"key":"15_CR4","unstructured":"Greek e-Government Interoperability Framework, \n                    \n                      http:\/\/www.e-gif.gov.gr\/portal\/page\/portal\/egif\/"},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1016\/j.datak.2012.12.005","volume":"87","author":"E. Paja","year":"2013","unstructured":"Paja, E., Choprab, A.K., Giorgini, P.: Trust-based specification of sociotechnical systems. Data & Knowledge Engineering\u00a087, 339\u2013353 (2013), doi:10.1016\/j.datak.2012.12.005","journal-title":"Data & Knowledge Engineering"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-642-41924-9_23","volume-title":"Conceptual Modeling","author":"E. Paja","year":"2013","unstructured":"Paja, E., Dalpiaz, F., Giorgini, P.: Managing Security Requirements Conflicts in Socio-Technical Systems. In: Ng, W., Storey, V.C., Trujillo, J.C. (eds.) ER 2013. LNCS, vol.\u00a08217, pp. 270\u2013283. Springer, Heidelberg (2013), doi:10.1007\/978-3-642-41924-9_23."},{"key":"15_CR7","unstructured":"Business Process Modelling and Notation (BPMN), \n                    \n                      http:\/\/www.bpmn.org"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Brucker, A.D., Malmignati, F., Merabti, M., Shi, Q., Zhou, B.: A Framework for Secure Service Composition. In: Procs. of the International Conference on Social Computing 2013 (SocialCom), pp. 647\u2013652. IEEE (2013), doi:10.1109\/SocialCom.2013.97","DOI":"10.1109\/SocialCom.2013.97"}],"container-title":["Lecture Notes in Computer Science","Secure and Trustworthy Service Composition"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13518-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T17:21:16Z","timestamp":1559064076000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-13518-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319135175","9783319135182"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13518-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}