{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:50:16Z","timestamp":1725501016224},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540744085"},{"type":"electronic","value":"9783540744092"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74409-2_20","type":"book-chapter","created":{"date-parts":[[2007,8,17]],"date-time":"2007-08-17T15:57:55Z","timestamp":1187366275000},"page":"178-189","source":"Crossref","is-referenced-by-count":0,"title":["Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes"],"prefix":"10.1007","author":[{"given":"Klaus-Peter","family":"Fischer","sequence":"first","affiliation":[]},{"given":"Udo","family":"Bleimann","sequence":"additional","affiliation":[]},{"given":"Steven","family":"Furnell","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"Alves, A., Arkin, A., Askary, S., Bloch, B., Curbera, F., Goland, Y., Kartha, N., Liu, C.K., K\u00f6nig, D., Mehta, V., Thatte, S., van der Rijn, D., Yendluri, P., Yiu, A. (eds).: Web Services Business Process Execution Language Version 2.0. In: OASIS (2006), \n                    \n                      http:\/\/www.oasis-open.org\/committees\/download.php\/18714\/wsbpel-specification-draft-May17.htm\n                    \n                    \n                   (last accessed 2007-02-22)"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Amnuaykanjanasin, P., Nupairoj, N.: The BPEL Orchestrating Framework for Secured Grid Services. In: Proc. International Conference on Information Technology: Coding and Computing (ITCC 2005), vol.\u00a0I, pp. 348\u2013353 (2005)","DOI":"10.1109\/ITCC.2005.271"},{"key":"20_CR3","unstructured":"Bajaj, S., Box, D., Chappell, D., Curbera, F., Daniels, G., Hallam-Baker, P., Hondo, M., Kaler, C., Langworthy, D., Nadalin, A., Nagaratnam, N., Prafullchandra, H., von Riegen, C., Roth, D., Schlimmer, J., Sharp, C., Shewchuk, J., Vedamuthu, A., Yal\u00e7inalp, \u00dc., Orchard, D.: Web Services Policy 1.2 - Framework (WS-Policy). In: World Wide Web Consortium (2006), \n                    \n                      http:\/\/www.w3.org\/Submission\/2006\/SUBM-WS-Policy-20060425\n                    \n                    \n                   (last accessed 2007-02-25)"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Beco, S., Cantalupo, B., Giammarino, L., Matskanis, N., Surridge, M.: OWL-WS: A Workflow Ontology for Dynamic Grid Service Composition. In: Proc. 1st International Conference on e-Science and Grid Computing (E-SCIENCE 2005), pp. 148\u2013155 (2005)","DOI":"10.1109\/E-SCIENCE.2005.64"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Chadwick, D.W., Su, L., Laborde, R.: Providing Secure Coordinated Access to Grid Services. In: Proc. 4th International Workshop on Middleware for Grid Computing (MCG 2006), pp. 1\u20136 (2006)","DOI":"10.1145\/1186675.1186677"},{"key":"20_CR6","unstructured":"Chinnici, R., Moreau, J.-J., Ryman, A., Weerawarana, S.(eds.): Web Services Description Language (WSDL) Version 2.0 Part 1: Core Language. In: World Wide Web Consortium (2006), \n                    \n                      http:\/\/www.w3.org\/TR\/2006\/CR-wsdl20-20060327\n                    \n                    \n                   (last accessed 2007-02-22)"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Detsch, A., Gaspary, L.P., Barcellos, M.P., Cavalheiro, G.G.H.: Towards a Flexible Security Framework for Peer-to-Peer-based Grid Computing. In: Proc. 2nd Workshop on Middleware for Grid Computing (MGC 2004), pp. 52\u201356 (2004)","DOI":"10.1145\/1028493.1028502"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Echahed, R., Prost, F.: Security Policy in a Declarative Style. In: Proc. 7th ACM SIGPLAN international conference on Principles and practice of declarative programming, PPDP 2005, pp. 153\u2013163 (2005)","DOI":"10.1145\/1069774.1069789"},{"key":"20_CR9","unstructured":"Fischer, K.P., Bleimann, U., Fuhrmann, W., Furnell, S.M.: A Security Infrastructure for Cross-Domain Deployment of Script-Based Business Processes in SOC Environments. In: Proc. 5th International Network Conference, INC 2005, pp. 207\u2013216 (2005)"},{"key":"20_CR10","unstructured":"Fischer, K.P., Bleimann, U., Fuhrmann, W., Furnell, S.M.: Security-Relevant Semantic Patterns of BPEL in Cross-Organisational Business Processes. In: Proc. 6th International Network Conference, INC 2006, pp. 203\u2013212 (2006)"},{"key":"20_CR11","first-page":"685","volume-title":"Proc. 1st International Workshop on Security Technologies for Next Generation Collaborative Business Applications (SECOBAP 2007)","author":"K.P. Fischer","year":"2007","unstructured":"Fischer, K.P., Bleimann, U., Fuhrmann, W., Furnell, S.M.: Security Policy Enforcement in BPEL-Defined Collaborative Business Processes. In: Proc. 1st International Workshop on Security Technologies for Next Generation Collaborative Business Applications (SECOBAP 2007), pp. 685\u2013694. IEEE Computer Society, Los Alamitos (2007)"},{"key":"20_CR12","unstructured":"Foster, I., Kesselman, C., Nick, J., Tuecke, S.: The Physiology of the Grid: An Open Grid Services Architecture for Distributed Systems Integration, Globus Project (2002), \n                    \n                      http:\/\/www.globus.org\/alliance\/publications\/papers\/ogsa.pdf\n                    \n                    \n                   (last accessed: 2007-02-23)"},{"issue":"3","key":"20_CR13","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1177\/109434200101500302","volume":"15","author":"I. Foster","year":"2001","unstructured":"Foster, I., Kesselman, C., Tuecke, S.: The Anatomy of the Grid: Enabling Scalable Virtual Organizations. Int. J. High Perform. Comput. Appl.\u00a015(3), 200\u2013222 (2001)","journal-title":"Int. J. High Perform. Comput. Appl."},{"issue":"4","key":"20_CR14","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/s10586-005-4094-2","volume":"8","author":"D. Gannon","year":"2005","unstructured":"Gannon, D., Krishnan, S., Fang, L., Kandaswamy, G., Simmhan, Y., Slominsk, A.: On Building Parallel & Grid Applications: Component Technology and Distributed Services. Cluster Computing\u00a08(4), 271\u2013277 (2005)","journal-title":"Cluster Computing"},{"issue":"4","key":"20_CR15","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/637411.637422","volume":"31","author":"C. Goble","year":"2002","unstructured":"Goble, C., De Roure, D.: The Grid: An Application of the Semantic Web. SIGMOD Rec.\u00a031(4), 65\u201370 (2002)","journal-title":"SIGMOD Rec."},{"key":"20_CR16","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s00778-003-0087-z","volume":"12","author":"B. Medjahed","year":"2003","unstructured":"Medjahed, B., Benatallah, B., Bouguettayaet, A., Ngu, A.H.H., Elmagarmid, A.K.: Business-to-business interactions: issues and enabling technologies. VLDB Journal\u00a012, 59\u201385 (2003)","journal-title":"VLDB Journal"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Li, P., Zdancewic, S.: Downgrading Policies and Relaxed Noninterference. In: Proc. 32nd ACM Symposium on Principles of Programming Languages (POPL 2005), pp. 158\u2013170 (2005)","DOI":"10.1145\/1040305.1040319"},{"issue":"12","key":"20_CR18","doi-asserted-by":"publisher","first-page":"1533","DOI":"10.1016\/j.jpdc.2005.05.022","volume":"65","author":"S.A. Ludwig","year":"2005","unstructured":"Ludwig, S.A., Reyhani, S.M.S.: Introduction of Semantic Matchmaking to Grid Computing. J. Parallel Distrib. Comput.\u00a065(12), 1533\u20131541 (2005)","journal-title":"J. Parallel Distrib. Comput."},{"key":"20_CR19","unstructured":"OurGrid, \n                    \n                      http:\/\/www.ourgrid.org\n                    \n                    \n                  , (last accessed: 2007-02-23)"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Ren, K., Xiao, N., Song, J., Chen, T., Zhang, W.: A Model for Semantic Annotation and Publication of Meteorology Grid Services in SMGA. In: Proc. 5th International Conference on Grid and Cooperative Computing Workshops (GCCW 2006), pp. 496\u2013503 (2006)","DOI":"10.1109\/GCCW.2006.8"},{"issue":"1","key":"20_CR21","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A. Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-Based Information-Flow Security. IEEE Journal on Selected Areas in Communications\u00a021(1), 5\u201319 (2003)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Sekar, R., Venkatakrishnan, V.N., Basu, S., Bhatkar, S., DuVarney, D.C.: Model-Carrying Code: A Practical Approach for Safe Execution of Untrusted Applications. In: Proc. 19th ACM Symposium on Operating Systems Principles (SOSP 2003), pp. 15\u201328 (2003)","DOI":"10.1145\/945445.945448"},{"key":"20_CR23","unstructured":"The Globus Toolkit, \n                    \n                      http:\/\/www-unix.globus.org\/toolkit\n                    \n                    \n                   (last accessed: 2007-02-24)"},{"key":"20_CR24","unstructured":"Tuecke, S., Czajkowski, K., Foster, I., Frey J., Graham, S., Kesselman, C., Maquire, T., Sandholm, T., Snelling, D., Vanderbilt, P. (eds.): Open Grid Services Infrastructure (OGSI) Version 1.0\u201d, Global Grid Forum (2003), \n                    \n                      http:\/\/www.ggf.org\/documents\/GWD-R\/GFD-R.015.pdf\n                    \n                    \n                   (last accessed: 2006-11-16)"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Venkatakrishnan, V.N., Perit, R., Sekar, R.: Empowering Mobile Code Using Expressive Security Policies. In: Proc. New Security Paradigms Workshop 2002, pp. 61\u201368 (2002)","DOI":"10.1145\/844102.844113"},{"issue":"3","key":"20_CR26","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/j.websem.2004.02.001","volume":"1","author":"H. Wang","year":"2004","unstructured":"Wang, H., Huang, J.Z., Qu, Y., Xie, J.: Web Services: Problems and Future Directions. Journal of Web Semantics\u00a01(3), 309\u2013320 (2004)","journal-title":"Journal of Web Semantics"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Welch, V., Siebenlist, F., Foster, I., Bresnahan, J., Czajkowski, K., Gawor, J., Kesselman, C., Meder, S., Pearlman, L., Tuecke, S.: Security for Grid Services. In: Proc. 12th IEEE International Symposium on High Performance Distributed Computing (HPDC 2003), pp. 48\u201357 (2003)","DOI":"10.1109\/HPDC.2003.1210015"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74409-2_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:25:14Z","timestamp":1619519114000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74409-2_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540744085","9783540744092"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74409-2_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}