{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:06:31Z","timestamp":1742979991359,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540749738"},{"type":"electronic","value":"9783540749745"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74974-5_26","type":"book-chapter","created":{"date-parts":[[2007,8,29]],"date-time":"2007-08-29T04:47:31Z","timestamp":1188362851000},"page":"319-329","source":"Crossref","is-referenced-by-count":5,"title":["Syntactic Validation of Web Services Security Policies"],"prefix":"10.1007","author":[{"given":"Yuichi","family":"Nakamura","sequence":"first","affiliation":[]},{"given":"Fumiko","family":"Sato","sequence":"additional","affiliation":[]},{"given":"Hyen-Vui","family":"Chung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"A CBDI Report Series \u2013 Guiding the Transition to Web Services and SOA, \n                      \n                        http:\/\/www.cbdiforum.com\/bronze\/downloads\/ws_roadmap_guide.pdf","key":"26_CR1"},{"doi-asserted-by":"crossref","unstructured":"Devanbu, P., Stubblebine, D.: Software Engineering for Security: a Roadmap. In: ICSE 2000 (2000)","key":"26_CR2","DOI":"10.1145\/336512.336559"},{"key":"26_CR3","volume-title":"Security Engineering: A Guide to Building Dependable Distributed Systems","author":"R. Anderson","year":"2001","unstructured":"Anderson, R.: Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, Chichester (2001)"},{"unstructured":"SCA Service Component Architecture: Assembly Model Specification, Version 1.00, (March 15, 2007)","key":"26_CR4"},{"unstructured":"SCA Policy Framework: Version 1.00 (March 2007)","key":"26_CR5"},{"unstructured":"WS-SecurityPolicy v1.2, Committee Specification (April 30, 2007), \n                      \n                        http:\/\/www.oasis-open.org\/committees\/download.php\/23821\/ws-securitypolicy-1.2-spec-cs.pdf","key":"26_CR6"},{"doi-asserted-by":"crossref","unstructured":"Tatsubori, M., Imamura, T., Nakamura, Y.: Best Practice Patterns and Tool Support for Configuring Secure Web Services Messaging. In: ICWS 2004 (2004)","key":"26_CR7","DOI":"10.1109\/ICWS.2004.1314745"},{"doi-asserted-by":"crossref","unstructured":"Nakamura, Y., Tatsubori, M., Imamura, T., Ono, K.: Model-Driven Security Based on a Web Services Security Architecture. In: International Conference on Service Computing (2005)","key":"26_CR8","DOI":"10.1109\/SCC.2005.66"},{"unstructured":"Unified Modeling Language, \n                      \n                        http:\/\/www.omg.org\/technology\/documents\/formal\/uml.htm","key":"26_CR9"},{"unstructured":"Web Services Security: SOAP Message Security 1.1","key":"26_CR10"},{"unstructured":"Basic Security Profile Version 1.0, Final Material (March 30, 2003)","key":"26_CR11"},{"unstructured":"W3C Candidate Recommendation \u201cWeb Services Policy 1.5 \u2013Framework\u201d (February 28, 2007), \n                      \n                        http:\/\/www.w3.org\/TR\/2007\/CR-ws-policy-framework-20070228\/","key":"26_CR12"},{"unstructured":"WS-Trust 1.3 OASIS Standard (March 19, 2007)","key":"26_CR13"},{"unstructured":"WS-SecureConversation 1.3 OASIS Standard (March 1, 2007)","key":"26_CR14"},{"doi-asserted-by":"crossref","unstructured":"Eastlake, D., Solo, J.R., Bartel, M., Boyer, J., Fox, B., Simon, E.: XML Signature Syntax and Processing, W3C Recommendation (February 12, 2002)","key":"26_CR15","DOI":"10.17487\/rfc3075"},{"unstructured":"XML Encryption Syntax and Processing, W3C Recommendation (December 10, 2002)","key":"26_CR16"},{"unstructured":"Web Services Security, UsernameToken Profile 1.1","key":"26_CR17"},{"unstructured":"Web Services Security: X.509 Certificate Token Profile 1.1","key":"26_CR18"},{"unstructured":"Prolog:- tutorial, \n                      \n                        http:\/\/www.csupomona.edu\/~jrfisher\/www\/prolog_tutorial\/contents.html","key":"26_CR19"},{"doi-asserted-by":"crossref","unstructured":"Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: Proceedings of UML2002 (2002)","key":"26_CR20","DOI":"10.1007\/3-540-45800-X_33"},{"doi-asserted-by":"crossref","unstructured":"Deubler, M., Gr\u00fcnbauer, J., J\u00fcrjens, J., Wimmel, G.: Sound Development of Secure Service-based Systems. In: ICSOC (2004)","key":"26_CR21","DOI":"10.1145\/1035167.1035185"},{"key":"26_CR22","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-3190-6","volume-title":"Symbolic Model Checking","author":"K. McMillan","year":"1993","unstructured":"McMillan, K.: Symbolic Model Checking. Kluwer Academic Publishers, Boston (1993)"},{"key":"26_CR23","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1145\/1030083.1030120","volume-title":"CCS 2004","author":"K. Bhargavan","year":"2004","unstructured":"Bhargavan, K., Fournet, C., Gordon, A.D.: Verifying policy-based security for web services. In: CCS 2004. Proceedings of the 11th ACM conference on Computer and communications security, pp. 268\u2013277. ACM Press, New York (2004)"},{"unstructured":"Web Services Security Policy Language (WS-SecurityPolicy) (December 18, 2002), \n                      \n                        http:\/\/www-106.ibm.com\/developerworks\/library\/ws-secpol\/","key":"26_CR24"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing \u2013 ICSOC 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74974-5_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T21:53:32Z","timestamp":1558475612000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74974-5_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540749738","9783540749745"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74974-5_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}