{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:12:11Z","timestamp":1737436331287,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540744085"},{"type":"electronic","value":"9783540744092"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74409-2_14","type":"book-chapter","created":{"date-parts":[[2007,8,17]],"date-time":"2007-08-17T15:57:55Z","timestamp":1187366275000},"page":"115-124","source":"Crossref","is-referenced-by-count":4,"title":["A Trust and Context Aware Access Control Model for Web Services Conversations"],"prefix":"10.1007","author":[{"given":"Marijke","family":"Coetzee","sequence":"first","affiliation":[]},{"given":"J. H. P.","family":"Eloff","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Anderson, S., Bohren, J., Boubez, T., Chanliau, M., Della-Libera, G., Dixon, B.: Web Services Secure Conversation Language (WS-SecureConversation) (February 2005)"},{"key":"14_CR2","unstructured":"Atkinson, B., et al.: Web Services Security (WS-Security), Version 1.0 (5 April 2002), http:\/\/www.verisign.com\/wss\/wss.pdf"},{"key":"14_CR3","unstructured":"Banerji, A., Bartolini, C., Beringer, D., Chopella, V., Govindarajan, K., Karp, A.: Web Services Conversation Language (WSCL) (2002), http:\/\/www.w3.org\/TR\/wscl10\/"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/3-540-45017-3_31","volume-title":"Advanced Information Systems Engineering","author":"B. Benatallah","year":"2003","unstructured":"Benatallah, B., Casati, F., Toumani, F., Hamadi, R.: Conceptual Modeling of Web Service Conversations. In: Eder, J., Missikoff, M. (eds.) CAiSE 2003. LNCS, vol.\u00a02681, pp. 449\u2013467. Springer, Heidelberg (2003)"},{"issue":"1","key":"14_CR5","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s10619-005-1075-7","volume":"18","author":"R. Bhatti","year":"2005","unstructured":"Bhatti, R., Bertino, E., Ghafoor, A.: A Trust-Based Context-Aware Access Control Model for Web-Services. Distributed and Parallel Databases archive\u00a018(1), 83\u2013105 (2005)","journal-title":"Distributed and Parallel Databases archive"},{"issue":"2","key":"14_CR6","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/1216016.1216025","volume":"50","author":"R. Bhatti","year":"2007","unstructured":"Bhatti, R., Bertino, E., Ghafoor, A.: An integrated approach to federated identity and privilege management in open systems. Commun. ACM\u00a050(2), 81\u201387 (2007)","journal-title":"Commun. ACM"},{"key":"14_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/3-540-48749-2_8","volume-title":"Secure Internet Programming","author":"M. Blaze","year":"1999","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The role of trust management in distributed systems security. In Proceedings of Fourth International Workshop on Mobile Object Systems: Secure Internet Mobile Computations. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol.\u00a01603, pp. 185\u2013210. Springer, Heidelberg (1999)"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Chakraborty, S., Ray, I.: TrustBAC: integrating trust relationships into the RBAC model for access control in open systems. In: SACMAT 2006, pp. 49\u201358 (2006)","DOI":"10.1145\/1133058.1133067"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Coetzee, M., Eloff, J.H.P.: Towards Web Services access control. Computers and Security\u00a023(7) (2004)","DOI":"10.1016\/j.cose.2004.05.006"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Coetzee, M., Eloff, J.H.P.: Autonomous trust for Web Services. Internet Research\u00a015(5) (2005)","DOI":"10.1108\/10662240510629448"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Coetzee, M., Eloff, J.H.P.: A Framework for Web Services Trust. In: 21st IFIP International Information Security Conference, Security and Privacy in Dynamic Environments, Karlstad University, 22 - 24 May, 2006, Karlstad, Sweden (2006)","DOI":"10.1007\/0-387-33406-8_7"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Damiani, E., De Capitani Di Vimercati, S., Paraboschi, S., Samarati, P.: Fine-grained access control for SOAP e-services. In: Proceedings of the 10th International World Wide Web Conference (WWW10), May 1-5, 2001, Hong Kong (2001)","DOI":"10.1145\/371920.372152"},{"key":"14_CR13","unstructured":"Della-Libera, G., et al.: Web Services Trust Language (WS-Trust) (2003), http:\/\/www.ibm.com\/developerworks\/library\/ws-trust\/index.html"},{"key":"14_CR14","unstructured":"Dey, A., Abowd, G.D.: Towards a Better Understanding of Context and Context-Awareness. In: The Workshop on The What, Who, Where, When, and How of Context-Awareness, 2000 Conference on Human Factors in Computing Systems, The Hague, The Netherlands (2000)"},{"key":"14_CR15","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-36609-1_6","volume-title":"Trust, Reputation, and Security: Theories and Practice","author":"T. Dimitrakos","year":"2003","unstructured":"Dimitrakos, T.: A service-oriented trust management framework. In: Falcone, R., Barber, S., Korba, L., Singh, M.P. (eds.) AAMAS 2002. LNCS (LNAI), vol.\u00a02631, pp. 53\u201372. Springer, Heidelberg (2003)"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Gottschalk, K., Graham, S., Kreger, H., Snell, J.: Introduction to web services architecture. IBM Systems Journal\u00a041(2) (2002)","DOI":"10.1147\/sj.412.0170"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Mecella, M., Ouzzani, M., Paci, F., Bertino, E.: Access control enforcement for conversation-based web services. In: WWW 2006, pp. 257\u2013266 (2006)","DOI":"10.1145\/1135777.1135818"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Miao, L., He-Qing, G., Jin-Dian, S.: An attribute and role based access control model for Web services. In: International Conference on Machine Learning and Cybernetics, vol.\u00a02, pp. 1302\u20131306 (2005)","DOI":"10.1109\/ICMLC.2005.1527144"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Olson, L., Winslett, M., Tonti, G., Seeley, N., Uszok, A., Bradshaw, J.M.: Trust Negotiation as an Authorization Service for Web Services. In: ICDE Workshops, vol.\u00a021 (2006)","DOI":"10.1109\/ICDEW.2006.154"},{"issue":"2","key":"14_CR20","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.engappai.2004.12.005","volume":"18","author":"S. Paurobally","year":"2005","unstructured":"Paurobally, S., Jennings, N.R.: Protocol engineering for web services conversations. Engineering Applications of Artificial Intelligence\u00a018(2), 237\u2013254 (2005)","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Shen, H., Hong, F.: An Attribute-Based Access Control Model for Web Services. In: Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies, pp. 74\u201379 (2006)","DOI":"10.1109\/PDCAT.2006.28"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Wonohoesodo, R., Tari, Z.: A Role based Access Control for Web Services, Services Computing. In: IEEE International Conference on (SCC 2004), pp. 49\u201356 (2004)","DOI":"10.1109\/SCC.2004.1357989"},{"key":"14_CR23","volume-title":"Proceedings of the 1997 IEEE Symposium on Security and Privacy","author":"S. Jajodia","year":"1997","unstructured":"Jajodia, S., Samarati, P., Subramanian, V.S.: A logical language for expressing authorisations. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy, Oakland, CA, IEEE Computer Society Press, Los Alamitos (1997)"},{"key":"14_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/3-540-36388-2_6","volume-title":"Practical Aspects of Declarative Languages","author":"N. Li","year":"2002","unstructured":"Li, N., Mitchell, J.C.: Datalog with constraints: A foundation for trust-management languages. In: Dahl, V., Wadler, P. (eds.) PADL 2003. LNCS, vol.\u00a02562, pp. 58\u201373. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74409-2_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T12:36:08Z","timestamp":1737376568000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74409-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540744085","9783540744092"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74409-2_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}