{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:49:54Z","timestamp":1725529794751},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642006715"},{"type":"electronic","value":"9783642006722"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00672-2_42","type":"book-chapter","created":{"date-parts":[[2009,3,21]],"date-time":"2009-03-21T17:04:48Z","timestamp":1237655088000},"page":"480-491","source":"Crossref","is-referenced-by-count":1,"title":["A Verification Mechanism for Secured Message Processing in Business Collaboration"],"prefix":"10.1007","author":[{"given":"Haiyang","family":"Sun","sequence":"first","affiliation":[]},{"given":"Jian","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yanchun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"10","key":"42_CR1","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/944217.944233","volume":"46","author":"M. Papazoglou","year":"2003","unstructured":"Papazoglou, M., Georgakopoulos, D.: Service-Oriented Computing. Communications of the ACM\u00a046(10), 25\u201328 (2003)","journal-title":"Communications of the ACM"},{"key":"42_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/978-3-540-85481-4_29","volume-title":"Web Information Systems Engineering - WISE 2008","author":"X. Wang","year":"2008","unstructured":"Wang, X., Zhang, Y., Shi, H., Yang, J.: BPEL4RBAC: An Authorisation Specification for WS-BPEL. In: Bailey, J., Maier, D., Schewe, K.-D., Thalheim, B., Wang, X.S. (eds.) WISE 2008. LNCS, vol.\u00a05175, pp. 381\u2013395. Springer, Heidelberg (2008)"},{"issue":"2","key":"42_CR3","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E., Feinstein, H., Youman, C.: Role-based Access Control Models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"42_CR4","unstructured":"Ferraiolo, D., Cugini, J., Kuhn, R.: Role Based Access Control: Features and Motivations. In: Proceedings of ACSAC (1995)"},{"key":"42_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-05324-9","volume-title":"Petri Nets for Systems Engineering: A Guide to Modeling, Verification, and Applications","author":"C. Girault","year":"2003","unstructured":"Girault, C., Valk, R.: Petri Nets for Systems Engineering: A Guide to Modeling, Verification, and Applications. Springer, Heidelberg (2003)"},{"key":"42_CR6","doi-asserted-by":"crossref","unstructured":"Sun, H., Wang, X., Yang, J., Zhang, Y.: Authorization Policy Based Business Collaboration Reliability Verification. In: Proceedings of ICSOC, pp. 579\u2013584 (2008)","DOI":"10.1007\/978-3-540-89652-4_49"},{"key":"42_CR7","unstructured":"Song, Y., Lee, J.: Deadlock Analysis of Petri Nets Using the Transitive Matrix. In: Proceedings of the SICE Annual Conference, pp. 689\u2013694 (2002)"},{"key":"42_CR8","doi-asserted-by":"crossref","unstructured":"Paci, F., Ouzzani, M., Mecella, M.: Verification of Access Control Requirements in Web Services Choreography. In: Proceedings of the IEEE International Conference on Service Computing, pp. 5\u201312 (2008)","DOI":"10.1109\/SCC.2008.116"},{"key":"42_CR9","doi-asserted-by":"crossref","unstructured":"Bertino, E., Crampton, J., Paci, F.: Access Control and Authorization Constraints for WS-BPEL. In: Proceedings of the IEEE International Conference on Web Services, pp. 275\u2013284 (2006)","DOI":"10.1109\/ICWS.2006.21"},{"key":"42_CR10","unstructured":"Liu, P., Chen, Z.: An Access Control Model for Web Services in Business Process. In: Proceedings of the 2004 IEEE\/WIC\/ACM International Conference on Web Intelligence, pp. 292\u2013298 (2004)"}],"container-title":["Lecture Notes in Computer Science","Advances in Data and Web Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00672-2_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T05:57:12Z","timestamp":1551938232000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00672-2_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642006715","9783642006722"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00672-2_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}