{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:41:00Z","timestamp":1725489660968},"publisher-location":"Berlin, Heidelberg","reference-count":48,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540748090"},{"type":"electronic","value":"9783540748106"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74810-6_2","type":"book-chapter","created":{"date-parts":[[2007,8,17]],"date-time":"2007-08-17T05:44:24Z","timestamp":1187329464000},"page":"24-74","source":"Crossref","is-referenced-by-count":10,"title":["Secure Service Orchestration"],"prefix":"10.1007","author":[{"given":"Massimo","family":"Bartoletti","sequence":"first","affiliation":[]},{"given":"Pierpaolo","family":"Degano","sequence":"additional","affiliation":[]},{"given":"Gian Luigi","family":"Ferrari","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Zunino","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Abadi, M., Fournet, C.: Access control based on execution history. In: Proc. 10th Annual Network and Distributed System Security Symposium (2003)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Atkinson, B., et al.: Web Services Security (WS-Security) (2002), http:\/\/www.oasis-open.org","DOI":"10.1016\/S1361-3723(02)00407-4"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","volume-title":"Construction and Analysis of Safe, Secure, and Interoperable Smart Devices","author":"A. Banerjee","year":"2005","unstructured":"Banerjee, A., Naumann, D.A.: History-based access control and secure information flow. In: Barthe, G., Burdy, L., Huisman, M., Lanet, J.-L., Muntean, T. (eds.) CASSIS 2004. LNCS, vol.\u00a03362, Springer, Heidelberg (2005)"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Barendregt, H.P., et al.: Term graph rewriting. In: Parallel Languages on PARLE: Parallel Architectures and Languages Europe (1987)","DOI":"10.1007\/3-540-17945-3_8"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","volume-title":"Foundations of Software Science and Computational Structures","author":"M. Bartoletti","year":"2005","unstructured":"Bartoletti, M., Degano, P., Ferrari, G.L.: History based access control with local policies. In: Sassone, V. (ed.) FOSSACS 2005. LNCS, vol.\u00a03441, Springer, Heidelberg (2005)"},{"key":"2_CR6","unstructured":"Bartoletti, M., Degano, P., Ferrari, G.L.: Planning and verifying service composition. Technical Report TR-07-02, Dip. Informatica, Univ. of Pisa. (to appear in Journal of Computer Security, 2007), http:\/\/compass2.di.unipi.it\/TR\/Files\/TR-07-02.pdf.gz"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Bartoletti, M., Degano, P., Ferrari, G.L., Zunino, R.: Types and effects for resource usage analysis. In: Proc. Foundations of Software Science and Computation Structures (Fossacs) (to appear, 2007)","DOI":"10.1007\/978-3-540-71389-0_4"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Bartoletti, M., Degano, P., Ferrari, G.L.: Enforcing secure service composition. In: Proc. 18th Computer Security Foundations Workshop (CSFW) (2005)","DOI":"10.1109\/CSFW.2005.17"},{"key":"2_CR9","unstructured":"Bartoletti, M., Degano, P., Ferrari, G.L.: Plans for service composition. In: Workshop on Issues in the Theory of Security (WITS) (2006)"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Bartoletti, M., Degano, P., Ferrari, G.L.: Types and effects for secure service orchestration. In: Proc. 19th Computer Security Foundations Workshop (CSFW) (2006)","DOI":"10.1109\/CSFW.2006.31"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Bergstra, J.A., Klop, J.W.: Algebra of communicating processes with abstraction. Theoretical Computer Science, 37 (1985)","DOI":"10.1016\/0304-3975(85)90088-X"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Besson, F., de Grenier de Latour, T., Jensen, T.: Interfaces for stack inspection. Journal of Functional Programming 15(2) (2005)","DOI":"10.1017\/S0956796804005465"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Bhargavan, K., Corin, R., Fournet, C., Gordon, A.D.: Secure sessions for web services. In: Proc. ACM Workshop on Secure Web Services (2004)","DOI":"10.1145\/1111348.1111355"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Bhargavan, K., Fournet, C., Gordon, A.D.: A semantics for web services authentication. In: Proc. ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL) (2004)","DOI":"10.1145\/964001.964018"},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11841197_6","volume-title":"Web Services and Formal Methods","author":"K. Bhargavan","year":"2006","unstructured":"Bhargavan, K., Fournet, C., Gordon, A.D.: Verified reference implementations of WS-security protocols. In: Bravetti, M., N\u00fa\u00f1ez, M., Zavattaro, G. (eds.) WS-FM 2006. LNCS, vol.\u00a04184, Springer, Heidelberg (2006)"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: Computer Security Foundations Workshop (CSFW) (2001)","DOI":"10.1109\/CSFW.2001.930138"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Bonelli, E., Compagnoni, A., Gunter, E.: Typechecking safe process synchronization. In: Proc. Foundations of Global Ubiquitous Computing. ENTCS, vol. 138(1) (2005)","DOI":"10.1016\/j.entcs.2005.05.002"},{"key":"2_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11841197_3","volume-title":"Web Services and Formal Methods","author":"M. Boreale","year":"2006","unstructured":"Boreale, M., et al.: SCC: a service centered calculus. In: Bravetti, M., N\u00fa\u00f1ez, M., Zavattaro, G. (eds.) WS-FM 2006. LNCS, vol.\u00a04184, Springer, Heidelberg (2006)"},{"key":"2_CR19","series-title":"Lecture Notes in Computer Science","volume-title":"Algebraic Methodology and Software Technology","author":"A. Brogi","year":"2004","unstructured":"Brogi, A., Canal, C., Pimentel, E.: Behavioural types and component adaptation. In: Rattray, C., Maharaj, S., Shankland, C. (eds.) AMAST 2004. LNCS, vol.\u00a03116, Springer, Heidelberg (2004)"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Bruni, R., Melgratti, H., Montanari, U.: Theoretical foundations for compensations in flow composition languages. In: Proc. of the 32nd ACM SIGPLAN-SIGACT Symposium on Principles of programming languages (POPL) (2005)","DOI":"10.1145\/1040305.1040323"},{"key":"2_CR21","unstructured":"Carbone, M., Honda, K., Yoshida, N.: Structured global programming for communicating behaviour. In: European Symposium in Programming Languages (ESOP) (to appear, 2007)"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Colcombet, T., Fradet, P.: Enforcing trace properties by program transformation. In: Proc. 27th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL) (2000)","DOI":"10.1145\/325694.325703"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Van der Aalst, W., ter Hofstede, A., Kiepuszewski, B., Barros, A.: Workflow patterns. Distributed and Parallel Databases 14(1) (2003)","DOI":"10.1023\/A:1022883727209"},{"key":"2_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48749-2_19","volume-title":"Secure Internet Programming","author":"G. Edjlali","year":"1999","unstructured":"Edjlali, G., Acharya, A., Chaudhary, V.: History-based access control for mobile code. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol.\u00a01603, Springer, Heidelberg (1999)"},{"key":"2_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0017477","volume-title":"Trees in Algebra and Programming - CAAP \u201994","author":"J. Esparza","year":"1994","unstructured":"Esparza, J.: On the decidability of model checking for several \u03bc-calculi and Petri nets. In: Tison, S. (ed.) CAAP 1994. LNCS, vol.\u00a0787, Springer, Heidelberg (1994)"},{"key":"2_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11888116_4","volume-title":"Formal Techniques for Networked and Distributed Systems - FORTE 2006","author":"G.L. Ferrari","year":"2006","unstructured":"Ferrari, G.L., Guanciale, R., Strollo, D.: JSCL: A middleware for service coordination. In: Najm, E., Pradat-Peyre, J.F., Donzeau-Gouge, V.V. (eds.) FORTE 2006. LNCS, vol.\u00a04229, Springer, Heidelberg (2006)"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Fong, P.W.: Access control by tracking shallow execution history. In: IEEE Symposium on Security and Privacy (2004)","DOI":"10.1109\/SECPRI.2004.1301314"},{"key":"2_CR28","volume-title":"Proc. ACM SIGMOD","author":"H. Garcia-Molina","year":"1987","unstructured":"Garcia-Molina, H., Salem, K.: Sagas. In: Proc. ACM SIGMOD, ACM Press, New York (1987)"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Gifford, D.K., Lucassen, J.M.: Integrating functional and imperative programming. In: ACM Conference on LISP and Functional Programming (1986)","DOI":"10.1145\/319838.319848"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Gordon, A., Jeffrey, A.: Types and effects for asymmetric cryptographic protocols. In: Proc. IEEE Computer Security Foundations Workshop (CSFW) (2002)","DOI":"10.1109\/CSFW.2002.1021808"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Gorla, D., Hennessy, M., Sassone, V.: Security policies as membranes in systems for global computing. Logical Methods in Computer Science 1(3) (2005)","DOI":"10.2168\/LMCS-1(3:2)2005"},{"key":"2_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11948148_27","volume-title":"Service-Oriented Computing \u2013 ICSOC 2006","author":"C. Guidi","year":"2006","unstructured":"Guidi, C., Lucchi, R., Gorrieri, R., Busi, N., Zavattaro, G.: SOCK: A calculus for service oriented computing. In: Dan, A., Lamersdorf, W. (eds.) ICSOC 2006. LNCS, vol.\u00a04294, Springer, Heidelberg (2006)"},{"key":"2_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053567","volume-title":"Programming Languages and Systems","author":"K. Honda","year":"1998","unstructured":"Honda, K., Vansconcelos, V., Kubo, M.: Language primitives and type discipline for structures communication-based programming. In: Hankin, C. (ed.) ESOP 1998 and ETAPS 1998. LNCS, vol.\u00a01381, Springer, Heidelberg (1998)"},{"key":"2_CR34","doi-asserted-by":"crossref","unstructured":"Igarashi, A., Kobayashi, N.: Resource usage analysis. In: Proc. 29th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL) (2002)","DOI":"10.1145\/503272.503303"},{"key":"2_CR35","doi-asserted-by":"crossref","unstructured":"Lapadula, A., Pugliese, R., Tiezzi, F.: A calculus for orchestration of web services. In: European Symposium in Programming Languages (ESOP) (to appear, 2007)","DOI":"10.1007\/978-3-540-71316-6_4"},{"key":"2_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11564751_64","volume-title":"Principles and Practice of Constraint Programming - CP 2005","author":"A. Lazovik","year":"2005","unstructured":"Lazovik, A., Aiello, M., Gennari, R.: Encoding requests to web service compositions as constraints. In: van Beek, P. (ed.) CP 2005. LNCS, vol.\u00a03709, Springer, Heidelberg (2005)"},{"key":"2_CR37","series-title":"Lecture Notes in Computer Science","volume-title":"Programming Languages and Systems","author":"K. Marriott","year":"2003","unstructured":"Marriott, K., Stuckey, P.J., Sulzmann, M.: Resource usage verification. In: Ohori, A. (ed.) APLAS 2003. LNCS, vol.\u00a02895, Springer, Heidelberg (2003)"},{"key":"2_CR38","doi-asserted-by":"crossref","unstructured":"Misra, J.: A programming model for the orchestration of web services. In: 2nd International Conference on Software Engineering and Formal Methods (SEFM 2004) (2004)","DOI":"10.1109\/SEFM.2004.1347498"},{"key":"2_CR39","doi-asserted-by":"crossref","unstructured":"Nielson, F., Nielson, H.R.: Type and effect systems. In: Correct System Design (1999)","DOI":"10.1007\/3-540-48092-7_6"},{"key":"2_CR40","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-03811-6","volume-title":"Principles of Program Analysis","author":"F. Nielson","year":"1999","unstructured":"Nielson, F., Nielson, H.R., Hankin, C.: Principles of Program Analysis. Springer, Heidelberg (1999)"},{"key":"2_CR41","doi-asserted-by":"crossref","unstructured":"Schneider, F.B.: Enforceable security policies. ACM Transactions on Information and System Security (TISSEC) 3(1) (2000)","DOI":"10.1145\/353323.353382"},{"key":"2_CR42","doi-asserted-by":"crossref","unstructured":"Sewell, P., Vitek, J.: Secure composition of untrusted code: box-\u03c0, wrappers and causality types. Journal of Computer Security 11(2) (2003)","DOI":"10.3233\/JCS-2003-11202"},{"key":"2_CR43","series-title":"Lecture Notes in Computer Science","volume-title":"Programming Languages and Systems","author":"C. Skalka","year":"2004","unstructured":"Skalka, C., Smith, S.: History effects and verification. In: Chin, W.-N. (ed.) APLAS 2004. LNCS, vol.\u00a03302, Springer, Heidelberg (2004)"},{"key":"2_CR44","doi-asserted-by":"crossref","unstructured":"Talpin, J.P., Jouvelot, P.: The type and effect discipline. Information and Computation 2(111) (1994)","DOI":"10.1006\/inco.1994.1046"},{"key":"2_CR45","unstructured":"Toma, I., Foxvog, D.: Non-functional properties in Web Services. WSMO Deliverable (2006)"},{"key":"2_CR46","unstructured":"Vallecillo, A., Vansconcelos, V., Ravara, A.: Typing the behaviours of objects and components using session types. In: Proc. of FOCLASA (2002)"},{"key":"2_CR47","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3054.001.0001","volume-title":"The Formal Semantics of Programming Languages","author":"G. Winskel","year":"1993","unstructured":"Winskel, G.: The Formal Semantics of Programming Languages. The MIT Press, Cambridge (1993)"},{"key":"2_CR48","doi-asserted-by":"crossref","unstructured":"Woo, T.Y.C., Lam, S.S.: A semantic model for authentication protocols. In: IEEE Symposium on Security and Privacy (1993)","DOI":"10.1109\/RISP.1993.287633"}],"container-title":["Lecture Notes in Computer Science","Foundations of Security Analysis and Design IV"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74810-6_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:24:10Z","timestamp":1605763450000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74810-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540748090","9783540748106"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74810-6_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}