{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:23:55Z","timestamp":1725902635000},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319615653"},{"type":"electronic","value":"9783319615660"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61566-0_29","type":"book-chapter","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T02:36:53Z","timestamp":1499135813000},"page":"310-322","source":"Crossref","is-referenced-by-count":1,"title":["Security Infrastructure for Service Oriented Architectures at the Tactical Edge"],"prefix":"10.1007","author":[{"given":"Vasileios","family":"Gkioulos","sequence":"first","affiliation":[]},{"given":"Stephen D.","family":"Wolthusen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"key":"29_CR1","unstructured":"Aloisio, A., Autili, M., D\u2019Angelo, A., Viidanoja, A., Leguay, J., Ginzler, T., Lampe, T., Spagnolo, L., Wolthusen, S.D., Flizikowski, A., Sliwa, J.: TACTICS: tactical service oriented architecture, CoRR, vol. abs\/1504.07578 (2015)"},{"key":"29_CR2","unstructured":"Lampe, T.A., Prasse, C., Diefenbach, A., Ginzler, T., Sliwa, J., McLaughlin, S.: TACTICS TSI architecture. In: International Conference on Military Communications and Information Systems (ICMCIS) (2016)"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Gkioulos, V., Wolthusen, S.D.: Securing tactical service oriented architectures. In: 2nd International Conference on Security of Smart cities, Industrial Control System and Communications (SSIC) (2016)","DOI":"10.1109\/SSIC.2016.7571813"},{"key":"29_CR4","unstructured":"Gkioulos, V., Wolthusen, S.D.: A risk analysis approach over network centric warfare and tactical service oriented architectures. Submitted for Review at: 7th International Conference on Mathematical Methods, Models and Architectures for Computer Networks Security (2017)"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Gkioulos, V., Wolthusen, S.D.: Enabling dynamic security policy evaluation for service-oriented architectures in tactical networks. In: Norwegian Information Security Conference (NISK 2015) (2015)","DOI":"10.1109\/SSIC.2016.7571813"},{"key":"29_CR6","unstructured":"Gkioulos, V., Wolthusen, S.D.: A security policy infrastructure for tactical service oriented architectures. In: 2nd Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems (CyberICPS 2016), in conjunction with ESORICS 2016 (2016)"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Gkioulos, V., Wolthusen, S.D.: Constraint analysis for security policy partitioning over tactical service oriented architectures. In: Advances in Networking Systems Architectures, Security, and Applications. Advances in Intelligent Systems and Computing. Springer, Heidelberg (2016)","DOI":"10.1007\/978-3-319-44354-6_9"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Gkioulos, V., Wolthusen, S.D.: Reconciliation of ontologically defined security policies for tactical service oriented architectures. In: International Conference on Future Network Systems and Security, FNSS (2016)","DOI":"10.1007\/978-3-319-48021-3_4"},{"key":"29_CR9","unstructured":"Gkioulos, V., Flizikowski, A., Stachowicz, A., Nogalski, D., Gleba, K., Sliwa, J.: Interoperability of security and quality of service policies over tactical SOA. In: IEEE Symposium on Computational Intelligence for Security and Defense Applications (IEEE CISDA 2016) - IEEE Symposium Series on Computational Intelligence (IEEE SSCI 2016) (2016)"}],"container-title":["Advances in Intelligent Systems and Computing","Complex, Intelligent, and Software Intensive Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61566-0_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,28]],"date-time":"2019-09-28T09:17:05Z","timestamp":1569662225000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61566-0_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615653","9783319615660"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61566-0_29","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}