{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T12:18:20Z","timestamp":1777378700944,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540720348","type":"print"},{"value":"9783540720355","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72035-5_1","type":"book-chapter","created":{"date-parts":[[2007,6,5]],"date-time":"2007-06-05T16:02:15Z","timestamp":1181059335000},"page":"1-13","source":"Crossref","is-referenced-by-count":6,"title":["Security Issues for the Use of Semantic Web in E-Commerce"],"prefix":"10.1007","author":[{"given":"Andreas","family":"Ekelhart","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Fenz","sequence":"additional","affiliation":[]},{"given":"A Min","family":"Tjoa","sequence":"additional","affiliation":[]},{"given":"Edgar R.","family":"Weippl","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1145\/642611.642680","volume-title":"CHI \u201903: Proceedings of the SIGCHI conference on Human factors in computing systems","author":"S.K. Bhavnani","year":"2003","unstructured":"Bhavnani, S.K., et al.: Strategy hubs: next-generation domain portals with search procedures. In: CHI \u201903: Proceedings of the SIGCHI conference on Human factors in computing systems, Ft. Lauderdale, Florida, USA, pp. 393\u2013400. ACM Press, New York (2003), doi:10.1145\/642611.642680"},{"issue":"3","key":"1_CR2","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1145\/545186.545190","volume":"5","author":"E. Bertino","year":"2002","unstructured":"Bertino, E., Ferrari, E.: Secure and selective dissemination of xml documents. ACM Trans. Inf. Syst. Secur.\u00a05(3), 290\u2013331 (2002), doi:10.1145\/545186.545190","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"1","key":"1_CR3","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/643477.643479","volume":"3","author":"J. Claessens","year":"2003","unstructured":"Claessens, J., Preneel, B., Vandewalle, J. (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions. ACM Trans. Inter. Tech.\u00a03(1), 28\u201348 (2003), doi:10.1145\/643477.643479","journal-title":"ACM Trans. Inter. Tech."},{"issue":"2","key":"1_CR4","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1145\/505586.505590","volume":"5","author":"E. Damiani","year":"2002","unstructured":"Damiani, E., et al.: A fine-grained access control system for xml documents. ACM Trans. Inf. Syst. Secur.\u00a05(2), 169\u2013202 (2002), doi:10.1145\/505586.505590","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"1_CR5","unstructured":"ebay (2007), http:\/\/www.ebay.com\/"},{"key":"1_CR6","unstructured":"ebsemantics (2006), http:\/\/www.ebsemantics.org"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/11961635_17","volume-title":"Information Systems Security","author":"A. Ekelhart","year":"2006","unstructured":"Ekelhart, A., et al.: Security ontology: Simulating threats to corporate assets. In: Bagchi, A., Atluri, V. (eds.) ICISS 2006. LNCS, vol.\u00a04332, pp. 249\u2013259. Springer, Heidelberg (2006)"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Ekelhart, A., et al.: Security ontologies: Improving quantitative risk analysis. In: Proceedings of the 40th Hawaii International Conference on System Sciences (HICSS 2007) (Jan. 2007)","DOI":"10.1109\/HICSS.2007.478"},{"key":"1_CR9","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1145\/1007568.1007634","volume-title":"SIGMOD \u201904: Proceedings of the 2004 ACM SIGMOD international conference on Management of data","author":"W. Fan","year":"2004","unstructured":"Fan, W., Chan, C.-Y., Garofalakis, M.: Secure xml querying with security views. In: SIGMOD \u201904: Proceedings of the 2004 ACM SIGMOD international conference on Management of data, Paris, France, pp. 587\u2013598. ACM Press, New York (2004), doi:10.1145\/1007568.1007634"},{"key":"1_CR10","unstructured":"Gambetta, D.: Can we trust trust. In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relatioins, pp. 213\u2013237. Published Online (2000)"},{"issue":"3","key":"1_CR11","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1145\/295685.295720","volume":"42","author":"R.J. Glushko","year":"1999","unstructured":"Glushko, R.J., Tenenbaum, J.M., Meltzer, B.: An xml framework for agent-based e-commerce. Commun. ACM\u00a042(3), 106 (1999), doi:10.1145\/295685.295720","journal-title":"Commun. ACM"},{"key":"1_CR12","unstructured":"Reduction of price dispersion through Semantic E-commerce. In: CEUR Workshop Proceedings, vol.\u00a055 (2002), http:\/\/www.CEUR-WS.org"},{"key":"1_CR13","unstructured":"Hauser, H.E.: Smes in germany, facts and figures 2000. Institut f\u00fcr Mittelstandsforschung, Bonn (2000)"},{"key":"1_CR14","doi-asserted-by":"publisher","first-page":"1217","DOI":"10.1145\/1160633.1160854","volume-title":"AAMAS \u201906: Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems","author":"T.D. Huynh","year":"2006","unstructured":"Huynh, T.D., Jennings, N.R., Shadbolt, N.R.: Certified reputation: how an agent can trust a stranger. In: AAMAS \u201906: Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems, Hakodate, Japan, pp. 1217\u20131224. ACM Press, New York (2006), doi:10.1145\/1160633.1160854"},{"issue":"1","key":"1_CR15","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MIC.2004.1260701","volume":"8","author":"M. Klein","year":"2004","unstructured":"Klein, M., Bernstein, A.: Toward high-precision service retrieval. IEEE Internet Computing\u00a08(1), 30\u201336 (2004)","journal-title":"IEEE Internet Computing"},{"key":"1_CR16","unstructured":"Owl web ontology language (2004), http:\/\/www.w3.org\/TR\/owl-features\/"},{"issue":"5","key":"1_CR17","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1007\/BF03250757","volume":"42","author":"R. Peters","year":"2000","unstructured":"Peters, R.: Elektronische M\u00e4rkte und automatisierte Verhandlungen. Wirtschaftsinformatik\u00a042(5), 413\u2013421 (2000)","journal-title":"Wirtschaftsinformatik"},{"key":"1_CR18","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/968559.968575","volume-title":"XMLSEC \u201903: Proceedings of the 2003 ACM workshop on XML security","author":"L. Qin","year":"2003","unstructured":"Qin, L., Atluri, V.: Concept-level access control for the semantic web. In: XMLSEC \u201903: Proceedings of the 2003 ACM workshop on XML security, Fairfax, Virginia, pp. 94\u2013103. ACM Press, New York (2003), doi:10.1145\/968559.968575"},{"key":"1_CR19","unstructured":"Romao, A., Da Silva, M.M.: Proxy certificates: A mechanism for delegating digital signature power to mobile agents. In: IAT99 Workshop on Agents in Electronic Commerce (1999)"},{"key":"1_CR20","unstructured":"Schoop, M., et al.: Enhancing decision and negotiation support in enterprise networks through semantic web technologies. In: XML Technologien f\u00fcr das Semantic Web - XSW 2002, Proceedings zum Workshop, pp. 161\u2013167. GI (2002)"},{"key":"1_CR21","unstructured":"Schoop, M.: Semantic web technology for electronic commerce. In: Proceedings of the The Tenth Research Symposium on Emerging Electronic Markets (2003)"},{"key":"1_CR22","first-page":"507","volume-title":"I3E \u201901: Proceedings of the IFIP Conference on Towards The E-Society","author":"M. Schoop","year":"2001","unstructured":"Schoop, M., et al.: A three-phase model of electronic marketplaces for software components in chemical engineering. In: I3E \u201901: Proceedings of the IFIP Conference on Towards The E-Society, Deventer, The Netherlands, pp. 507\u2013522. Kluwer Academic Publishers, Dordrecht (2001)"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Trastour, D., Bartolini, C., Priest, C.: Semantic web support for the business-to-business e-commerce lifecycle (2002)","DOI":"10.1145\/511455.511458"},{"key":"1_CR24","unstructured":"Xml key management specification (xkms) (2001), http:\/\/www.w3.org\/TR\/xkms\/"},{"key":"1_CR25","unstructured":"Xml-signature syntax and processing (2002), http:\/\/www.w3.org\/TR\/xmldsig-core\/"},{"key":"1_CR26","volume-title":"Third International Conference on Autonomous Agents (Agents \u201999)","author":"G. Zacharia","year":"1999","unstructured":"Zacharia, G.: Trust management through reputation mechanisms. In: Third International Conference on Autonomous Agents (Agents \u201999), May 1999, ACM Press, New York (1999)"}],"container-title":["Lecture Notes in Computer Science","Business Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72035-5_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:28:18Z","timestamp":1605763698000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72035-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540720348","9783540720355"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72035-5_1","relation":{},"subject":[]}}