{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T16:19:53Z","timestamp":1725812393014},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319135175"},{"type":"electronic","value":"9783319135182"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13518-2_3","type":"book-chapter","created":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T05:51:00Z","timestamp":1417413060000},"page":"36-49","source":"Crossref","is-referenced-by-count":2,"title":["Adopting Existing Communication Platforms for Security Enabling Technologies"],"prefix":"10.1007","author":[{"given":"Konstantinos","family":"Giannakakis","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1007\/978-3-319-13518-2_4","volume-title":"Secure and Trustworthy Service Composition","author":"P.H. Meland","year":"2014","unstructured":"Meland, P.H., Rios, E., Tountopoulos, V., Brucker, A.D.: The aniketos platform. In: Brucker, A.D., Dalpiaz, F., Giorgini, P., Meland, P.H., Rios, E. (eds.) Secure and Trustworthy Service Composition. LNCS, vol.\u00a08900, pp. 50\u201362. Springer, Heidelberg (2014)"},{"key":"3_CR2","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1007\/978-3-319-13518-2_2","volume-title":"Secure and Trustworthy Service Composition","author":"P.H. Meland","year":"2014","unstructured":"Meland, P.H., et al.: Security and trustworthiness threats to composite services: Taxonomy, countermeasures, and research directions. In: Brucker, A.D., Dalpiaz, F., Giorgini, P., Meland, P.H., Rios, E. (eds.) Secure and Trustworthy Service Composition. LNCS, vol.\u00a08900, pp. 10\u201335. Springer, Heidelberg (2014)"},{"key":"3_CR3","unstructured":"OSGi in Action - Richard S. Hall, Karl Pauls, Stuart McCulloch, and David Savage - Manning Publications Co. (April 2011)"},{"key":"3_CR4","unstructured":"Enterprise OSGi in Action - Holly Cummins and Timothy Ward - Manning Publications Co. (March 2013)"},{"key":"3_CR5","unstructured":"Building Modular Cloud Apps with OSGi - Paul Bakker, Bert Ertman - O\u2019Reilly Media (September 2013)"},{"key":"3_CR6","unstructured":"OSGi Alliance Specifications, \n                    \n                      http:\/\/www.osgi.org\/Specifications\/HomePage"},{"key":"3_CR7","unstructured":"Activiti Web Site, \n                    \n                      http:\/\/activiti.org\/"},{"key":"3_CR8","unstructured":"Apache Karaf Web Site, \n                    \n                      http:\/\/karaf.apache.org\/"},{"key":"3_CR9","unstructured":"Zookeper Web Site, \n                    \n                      http:\/\/zookeeper.apache.org\/"}],"container-title":["Lecture Notes in Computer Science","Secure and Trustworthy Service Composition"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13518-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T17:00:42Z","timestamp":1559062842000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-13518-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319135175","9783319135182"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13518-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}