{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T05:22:58Z","timestamp":1740374578391,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540219996"},{"type":"electronic","value":"9783540259565"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-25956-5_17","type":"book-chapter","created":{"date-parts":[[2010,8,4]],"date-time":"2010-08-04T08:20:50Z","timestamp":1280910050000},"page":"240-253","source":"Crossref","is-referenced-by-count":8,"title":["OWL-S Semantics of Security Web Services: a Case Study"],"prefix":"10.1007","author":[{"given":"Grit","family":"Denker","sequence":"first","affiliation":[]},{"given":"Son","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"Ton","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Sycara, K., Ju, J., Klusch, M., Widoff, S.: Dynamic service matchmaking among agents in open information environments. ACM SIGMOD Record, Special Issue on the Semantic Interoperability in Global Information Systems (1999)","DOI":"10.1145\/309844.309895"},{"key":"17_CR2","unstructured":"Denker, G., Hobbs, J., Martin, D., Narayanan, S., Waldinger, R.: Accessing information and services on the DAML-enabled Web. In: Decker, S., Fensel, D., Seth, A., Staab, S. (eds.) 2nd. Intern. Workshop on the Semantic Web SemWeb 2001, Workshop at WWW10, Hong Kong, China (2001), http:\/\/sunsite.informatik.rwth-aachen.de\/Publications\/CEUR-WS\/Vol-40\/"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"McIlraith, S., Song, T., Zeng, H.: Mobilizing the Semantic Web with DAMLenabled Web services. In: Decker, S., Fensel, D., Seth, A., Staab, S. (eds.) 2nd. Intern. Workshop on the Semantic Web SemWeb 2001, Workshop at WWW 10, Hongkong, China (2001), http:\/\/sunsite.informatik.rwth-aachen.de\/Publications\/CEUR-WS\/Vol-40\/","DOI":"10.1109\/5254.920599"},{"key":"17_CR4","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/5254.920599","volume":"16","author":"S. McIlraith","year":"2001","unstructured":"McIlraith, S., Song, T., Zeng, H.: Semantic Web services. IEEE Intelligent Systems, Special Issue on the Semantic Web\u00a016, 46\u201353 (2001)","journal-title":"IEEE Intelligent Systems, Special Issue on the Semantic Web"},{"key":"17_CR5","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/5254.920597","volume":"16","author":"J. Hendler","year":"2001","unstructured":"Hendler, J.: Agents on the Web. IEEE Intelligent Systems, Special Issue on the Semantic Web\u00a016, 30\u201337 (2001)","journal-title":"IEEE Intelligent Systems, Special Issue on the Semantic Web"},{"key":"17_CR6","unstructured":"Kagal, L.: Rei: A Policy Language for the Me-Centric Project. HP Labs Technical Report (2002)"},{"key":"17_CR7","unstructured":"Kagal, L., Finin, T., Joshi, A.: A policy language for pervasive systems. In: Fourth IEEE International Workshop on Policies for Distributed Systems and Networks (2003)"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Uszok, A., Bradshaw, J., Jeffers, R., Suri, N., Hayes, P., Breedy, M., Bunch, L., Johnson, M., Kulkarni, S., Lott, J.: KAoS policy and domain services: Toward a description-logic approach to policy representation, deconfliction and enforcement. In: IEEE Workshop on Policy 2003, pp. 93\u201396 (2003)","DOI":"10.1109\/POLICY.2003.1206963"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Bradshaw, J., Uszok, A., Jeffers, R., Suri, N., Hayes, P., Burstein, M., Acquisiti, A., Benyo, B., Breedy, M., Carvalho, M., Diller, D., Johnson, M., Kulkarni, S., Lott, J., Sierhuis, M., Hoof, R.V.: Representation and Reasoning for DAML-Based Policy and Domain Services in KAoS and Nomads. Submitted to AAMAS 2003, Melbourne, Australia, July 14-18 (2003)","DOI":"10.1145\/860575.860709"},{"key":"17_CR10","unstructured":"Ribeiro, C.N., Zuquete, A., Ferreira, P., Guedes, P.: SPL: An access control language for security policies with complex constraints. In: Network and Distributed System Security Symposium, NDSS 2001 (2001)"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-44569-2_2","volume-title":"Policies for Distributed Systems and Networks","author":"N. Damianou","year":"2001","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The ponder policy specification language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol.\u00a01995, p. 18. Springer, Heidelberg (2001)"},{"key":"17_CR12","unstructured":"Golbeck, J., Parsia, B., Hendler, J.: Inferring reputation on the Semantic Web (2004), http:\/\/www.mindswap.org\/papers\/GolbeckWWW04.pdf"},{"key":"17_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/978-3-540-39718-2_25","volume-title":"The Semantic Web - ISWC 2003","author":"F. Gandon","year":"2003","unstructured":"Gandon, F., Sadeh, N.: A semantic e-wallet to reconcile privacy and context awareness. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol.\u00a02870, pp. 385\u2013401. Springer, Heidelberg (2003)"},{"key":"17_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/3-540-48005-6_14","volume-title":"The Semantic Web - ISWC 2002","author":"Y. Gil","year":"2002","unstructured":"Gil, Y., Ratnakar, V.: Trusting information sources one citizen at a time. In: Horrocks, I., Hendler, J. (eds.) ISWC 2002. LNCS, vol.\u00a02342, p. 162. Springer, Heidelberg (2002)"},{"key":"17_CR15","unstructured":"Atkinson, B., Della-Libera, G., Hada, S., Hondo, M., Hallam-Baker, P., Klein, J., LaMacchia, B., Leach, P., Manferdelli, J., Maruyama, H., Nadalin, A., Nagaratnam, N., Prfullchandra, H., Shewchuk, J., Simon, D.: Web services security, WS-Security (2002), http:\/\/www-106.ibm.com\/developerworks\/webservices\/library\/ws-secure\/"},{"key":"17_CR16","unstructured":"IETF and W3C Working Group: XML encryption (2001), http:\/\/www.w3.org\/Encryption\/2001\/"},{"key":"17_CR17","unstructured":"IETF and W3C Working Group: XML signature (2003), http:\/\/www.w3.org\/Signature\/"},{"key":"17_CR18","unstructured":"(SSTC), O.S.S.T.: Security assertion markup language (SAML) - core assertion architecture (2001), http:\/\/www.oasis-open.org\/committees\/security\/docs\/draft-sstc-core-19.p%df"},{"key":"17_CR19","unstructured":"(Liberty alliance project specifications), http:\/\/www.projectliberty.org\/specs\/"},{"key":"17_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-540-39718-2_13","volume-title":"The Semantic Web - ISWC 2003 [28]","author":"D. Wu","year":"2003","unstructured":"Wu, D., Parsia, B., Sirin, E., Hendler, J., Nau, D.: Automating DAML-S Web services composition using SHOP2. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003 [28]. LNCS, vol.\u00a02870, pp. 195\u2013210. Springer, Heidelberg (2003)"},{"key":"17_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-3-540-39718-2_21","volume-title":"The Semantic Web - ISWC 2003","author":"L. Chen","year":"2003","unstructured":"Chen, L., Shadbold, N., Goble, C., Tao, F., Cox, S., Puleston, C., Smart, P.: Towards a knowledge-based approach to semantic service composition. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003 [28]. LNCS, vol.\u00a02870, pp. 319\u2013334. Springer, Heidelberg (2003)"},{"key":"17_CR22","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R. Needham","year":"1978","unstructured":"Needham, R., Schroeder, M.: Using encryption for authentication in large networks of computers. Communications of the ACM\u00a021, 993\u2013998 (1978)","journal-title":"Communications of the ACM"},{"key":"17_CR23","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1145\/3812.3818","volume":"28","author":"S. Even","year":"1985","unstructured":"Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Communications of the ACM\u00a028, 637\u2013647 (1985)","journal-title":"Communications of the ACM"},{"key":"17_CR24","volume-title":"Proc. 19th IEEE Computer Society Symposium on Research in Securiyt and Privacy","author":"F. Bao","year":"1998","unstructured":"Bao, F., Deng, R., Mao, W.: Efficient and practical fair exchange protocols with off-line TTP. In: Proc. 19th IEEE Computer Society Symposium on Research in Securiyt and Privacy, IEEE, Los Alamitos (1998)"},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Franklin, M.K., Reiter, M.K.: Fair exchange with a semi-trusted third party (extended abstract). In: ACM Conference on Computer and Communications Security, pp. 1\u20135 (1997)","DOI":"10.1145\/266420.266424"},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Datta, A., Derek, A., Mitchell, J., Pavlovic, D.: A derivation system for security protocol and its logical formalization. In: Proc. IEEE Computer Security Foundations Workshop, Asilomar, CA, June 30 -July 2, pp. 109\u2013125 (2003)","DOI":"10.1109\/CSFW.2003.1212708"},{"key":"17_CR27","doi-asserted-by":"crossref","unstructured":"Guttman, J., Thayer, F., Carlson, J., Herzog, J., Ramsdell, J., Sniffen, B.: Trust management in strand spaces: A rely-guarantee method. In: European Symposium on Programming (ESOP 2004), Barcelona, Spain, March 29-April 2 (2004)","DOI":"10.1007\/978-3-540-24725-8_23"},{"key":"17_CR28","series-title":"Lecture Notes in Computer Science","volume-title":"The Semantic Web - ISWC 2003","year":"2003","unstructured":"Fensel, D., Sycara, K., Mylopoulos, J. (eds.): ISWC 2003. LNCS, vol.\u00a02870. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","The Semantic Web: Research and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-25956-5_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T19:53:06Z","timestamp":1740340386000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-25956-5_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540219996","9783540259565"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-25956-5_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}