{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:41:12Z","timestamp":1742949672012,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319651262"},{"type":"electronic","value":"9783319651279"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65127-9_10","type":"book-chapter","created":{"date-parts":[[2017,8,5]],"date-time":"2017-08-05T03:35:53Z","timestamp":1501904153000},"page":"115-127","source":"Crossref","is-referenced-by-count":2,"title":["Security Requirements for the Deployment of Services Across Tactical SOA"],"prefix":"10.1007","author":[{"given":"Vasileios","family":"Gkioulos","sequence":"first","affiliation":[]},{"given":"Stephen D.","family":"Wolthusen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,6]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Gkioulos, V., Wolthusen, S.D.: Securing tactical service oriented architectures. In: 2nd International Conference on Security of Smart cities, Industrial Control System and Communications (SSIC) (2016)","DOI":"10.1109\/SSIC.2016.7571813"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Gkioulos, V., Wolthusen, S.D.: Enabling dynamic security policy evaluation for service-oriented architectures in tactical networks. In: Norwegian Information Security Conference (NISK-2015) (2015)","DOI":"10.1109\/SSIC.2016.7571813"},{"key":"10_CR3","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-319-44354-6_9","volume-title":"Advances in Network Systems. Architectures, Security, and Applications","author":"V Gkioulos","year":"2017","unstructured":"Gkioulos, V., Wolthusen, S.D.: Constraint analysis for security policy partitioning over tactical service oriented architectures. In: Grzenda, M., Awad, A.I., Furtak, J., Legierski, J. (eds.) Advances in Network Systems. Architectures, Security, and Applications. AISC, vol. 461, pp. 149\u2013166. Springer, Cham (2017). doi: 10.1007\/978-3-319-44354-6_9"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Gkioulos, V., Wolthusen, S.D.: Reconciliation of ontologically defined security policies for tactical service oriented architectures. In: International Conference on Future Network Systems and Security-FNSS (2016)","DOI":"10.1007\/978-3-319-48021-3_4"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Gkioulos, V., Wolthusen, S.D.: A security policy infrastructure for tactical service oriented architectures. In: 2nd Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems (CyberICPS 2016), in conjunction with ESORICS (2016)","DOI":"10.1007\/978-3-319-61437-3_3"},{"key":"10_CR6","unstructured":"Gkioulos, V., Wolthusen, S.D., Flizikowski, A., Stachowicz, A., Nogalski, D., Gleba, K., Sliwa, J.: Interoperability of security and quality of service policies over tactical SOA. In: IEEE Symposium on Computational Intelligence for Security and Defense Applications (IEEE CISDA 2016) - IEEE Symposium Series on Computational Intelligence (IEEE SSCI 2016) (2016)"},{"key":"10_CR7","unstructured":"Aloisio, A., Autili, M., D\u2019Angelo, A., Viidanoja, A., Leguay, J., Ginzler, T., Lampe, T., Spagnolo, L., Wolthusen, S.D., Flizikowski, A., Sliwa, J.: TACTICS: tactical service oriented architecture. CoRR abs\/1504.07578 (2015)"},{"key":"10_CR8","unstructured":"Lampe, T.A., Prasse, C., Diefenbach, A., Ginzler, T., Sliwa, J., McLaughlin, S.: TACTICS TSI architecture. In: International Conference on Military Communications and Information Systems ICMCIS (2016)"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Lopes, R.R.F., Wolthusen, S.D.: Distributed security policies for service-oriented architectures over tactical networks. In: Military Communications Conference, MILCOM 2015, pp. 1548\u20131553. IEEE, October 2015","DOI":"10.1109\/MILCOM.2015.7357665"},{"key":"10_CR10","unstructured":"Priya, S.B., Theebendra, C.: A Study on Security Challenges in Mobile Adhoc Networks (2016)"},{"key":"10_CR11","unstructured":"Kauser, S.H., Kumar, P.A.: MANET: Services, Parameters, Applications, Attacks & Challenges (2016)"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Patidar, D., Dubey, J.: A hybrid approach for dynamic intrusion detection, enhancement of performance and security in MANET. In: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, ICTCS 2016, pp. 81:1\u201381:5. ACM, New York (2016)","DOI":"10.1145\/2905055.2905291"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Kannammal, A., Roy, S.S.: Survey on secure routing in mobile ad hoc networks. In: 2016 International Conference on Advances in Human Machine Interaction (HMI), pp. 1\u20137, March 2016","DOI":"10.1109\/HMI.2016.7449197"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Bass, T., Robichaux, R.: Defense-in-depth revisited: qualitative risk analysis methodology for complex network-centric operations. In: Military Communications Conference, MILCOM 2001, Communications for Network-Centric Operations: Creating the Information Force, vol. 1, pp. 64\u201370. IEEE (2001)","DOI":"10.1109\/MILCOM.2001.985765"},{"key":"10_CR15","unstructured":"Kidston, D., Li, L., Tang, H., Mason, P.: Mitigating security threats in tactical networks. Technical report, DTIC Document (2010)"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Jacobs, S.: Tactical network security. In: Military Communications Conference Proceedings, MILCOM 1999, vol. 1, pp. 651\u2013655. IEEE (1999)","DOI":"10.1109\/MILCOM.1999.822764"},{"issue":"11","key":"10_CR17","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/COM-M.2006.248156","volume":"44","author":"JL Burbank","year":"2006","unstructured":"Burbank, J.L., Chimento, P.F., Haberman, B.K., Kasch, W.T.: Key challenges of military tactical networking and the elusive promise of manet technology. Comm. Mag. 44(11), 39\u201345 (2006)","journal-title":"Comm. Mag."},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Wang, H., Wang, Y., Han, J.: A security architecture for tactical mobile ad hoc networks. In: Second International Workshop on Knowledge Discovery and Data Mining, WKDD 2009, pp. 312\u2013315, January 2009","DOI":"10.1109\/WKDD.2009.154"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Kidston, D., Li, L.: Management through cross-layer design in mobile tactical networks. In: 2010 IEEE Network Operations and Management Symposium - NOMS 2010, pp. 890\u2013893, April 2010","DOI":"10.1109\/NOMS.2010.5488350"},{"issue":"10","key":"10_CR20","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1109\/MCOM.2007.4342822","volume":"45","author":"K Lund","year":"2007","unstructured":"Lund, K., Eggen, A., Hadzic, D., Hafsoe, T., Johnsen, F.T.: Using web services to realize service oriented architecture in military communication networks. IEEE Commun. Mag. 45(10), 47\u201353 (2007)","journal-title":"IEEE Commun. Mag."},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Birman, K., Hillman, R., Pleisch, S.: Building Net-centric Military Applications over Service Oriented Architectures (2005)","DOI":"10.1117\/12.605149"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Suri, N.: Dynamic service-oriented architectures for tactical edge networks. In: Proceedings of the 4th Workshop on Emerging Web Services Technology, WEWST 2009, pp. 3\u201310. ACM, New York (2009)","DOI":"10.1145\/1645406.1645408"},{"key":"10_CR23","unstructured":"Russell, D., Xu, J.: Service oriented architectures in the delivery of capability. In: Proceedings of Systems Engineering for Future Capability (2007)"},{"key":"10_CR24","unstructured":"Croom, Jr., C.E.: Service-oriented architectures in net-centric operations. Technical report, DTIC Document (2006)"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Johnsen, F.T., Flathagen, J., Hafs\u00f8e, T.: Pervasive service discovery across heterogeneous tactical networks. In: MILCOM 2009 - Military Communications Conference, pp. 1\u20138. IEEE, October 2009","DOI":"10.1109\/MILCOM.2009.5380075"},{"key":"10_CR26","unstructured":"Russell, D., Xu, J.: Service oriented architectures in the provision of military capability. In: UK e-Science All Hands Meeting, Citeseer (2007)"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Russell, D., Looker, N., Liu, L., Xu, J.: Service-oriented integration of systems for military capability. In: 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC), pp. 33\u201341. IEEE (2008)","DOI":"10.1109\/ISORC.2008.45"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Candolin, C.: A security framework for service oriented architectures. In: MILCOM 2007 - IEEE Military Communications Conference, pp. 1\u20136, October 2007","DOI":"10.1109\/MILCOM.2007.4455332"},{"key":"10_CR29","unstructured":"Marinos, L., ENISA: ENISA Threat Taxonomy A tool for structuring threat information Initial Version 1.0. Technical report, January 2016"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65127-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T22:13:25Z","timestamp":1569968005000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65127-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319651262","9783319651279"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65127-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}