{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:33:49Z","timestamp":1725532429768},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642013980"},{"type":"electronic","value":"9783642013997"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01399-7_74","type":"book-chapter","created":{"date-parts":[[2009,5,6]],"date-time":"2009-05-06T01:18:41Z","timestamp":1241572721000},"page":"943-954","source":"Crossref","is-referenced-by-count":0,"title":["Towards Automated Secure Web Service Execution"],"prefix":"10.1007","author":[{"given":"B\u00e9la","family":"Genge","sequence":"first","affiliation":[]},{"given":"Piroska","family":"Haller","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"74_CR1","series-title":"Lecture Notes in Computer Science","volume-title":"Scenarios: Models, Transformations and Tools","author":"C.J.F. Cremers","year":"2005","unstructured":"Cremers, C.J.F., Mauw, S.: Checking secrecy by means of partial order reduction. In: Leue, S., Systa, T. (eds.) Scenarios: Models, Transformations and Tools. LNCS, vol.\u00a03466. Springer, Heidelberg (2005)"},{"key":"74_CR2","doi-asserted-by":"crossref","unstructured":"Mengual, L., Barcia, N., Jimenez, E., Menasalvas, E., Setien, J., Yaguez, J.: Automatic implementation system of security protocols based on formal description techniques. In: Proceedings of the Seventh International Symposium on Computers and Communications, pp. 355\u2013401 (2002)","DOI":"10.1109\/ISCC.2002.1021701"},{"key":"74_CR3","unstructured":"Abdullah, I., Menasc\u00e9, D.: Protocol specification and automatic implementation using XML and CBSE. In: IASTED conference on Communications, Internet and Information Technology (2003)"},{"key":"74_CR4","unstructured":"Akkiraju, R., Farrell, J., Miller, J., Nagarajan, M., Schmidt, M., Verma, K.: Web Service Semantics - WSDL-S. A joint UGA-IBM Technical Note (2005)"},{"key":"74_CR5","unstructured":"Clark, J., Jacob, J.: A Survey of Authentication Protocol Literature: Version 1.0. York University (1997)"},{"key":"74_CR6","first-page":"162","volume-title":"Proceedings of the 9th CSFW","author":"L. Gavin","year":"1996","unstructured":"Gavin, L.: Some new attacks upon security protocols. In: Proceedings of the 9th CSFW, pp. 162\u2013169. IEEE Computer Society Press, Los Alamitos (1996)"},{"key":"74_CR7","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.entcs.2004.12.047","volume":"142","author":"C.J.F. Cremers","year":"2006","unstructured":"Cremers, C.J.F.: Compositionality of Security Protocols: A Research Agenda. Electr. Notes Theor. Comput. Sci.\u00a0142, 99\u2013110 (2006)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"74_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1483","DOI":"10.1007\/11575801_34","volume-title":"On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE","author":"A. Kim","year":"2005","unstructured":"Kim, A., Luo, J., Kang, M.: Security ontology for annotating resources. In: Meersman, R., Tari, Z. (eds.) OTM 2005. LNCS, vol.\u00a03761, pp. 1483\u20131499. Springer, Heidelberg (2005)"},{"key":"74_CR9","doi-asserted-by":"crossref","unstructured":"Blanco, C., Lasheras, J., Valencia-Garcia, R., Fernandez-Medina, E., Toval, A., Piattini, M.: A systematic review and comparison of security ontologies. In: Proc. of the Third International Conference on Availability, Reliability and Security, pp. 813\u2013820 (2008)","DOI":"10.1109\/ARES.2008.33"},{"issue":"10","key":"74_CR10","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.istr.2004.11.002","volume":"1","author":"G. Denkera","year":"2005","unstructured":"Denkera, G., Kagal, L., Finin, T.: Security in the semantic web using owl. Information Security Technical Report\u00a01(10), 51\u201358 (2005)","journal-title":"Information Security Technical Report"},{"key":"74_CR11","unstructured":"Gong, L.: Fail-Stop Protocols: An Approach to Designing Secure Protocols. In: Proceedings of the 5th IFIP Conference on Dependable Computing and Fault-Tolerant Systems, pp. 44\u201355 (1995)"},{"key":"74_CR12","unstructured":"World Wide Web Consortium, OWL Web Ontology Language Reference, W3C Recommendation (2004)"},{"key":"74_CR13","unstructured":"Gutmann, P.: Cryptlib Encryption Toolkit, \n                    \n                      http:\/\/www.cs.auckland.ac.nz\/-~pgut001\/cryptlib\/index.html"},{"key":"74_CR14","unstructured":"OpenSSL Project, version 0.9.8h, \n                    \n                      http:\/\/www.openssl.org\/"},{"key":"74_CR15","unstructured":"Laboratoire Specification et Verification, Security Protocol Open Repository, \n                    \n                      http:\/\/www.lsv.ens-cachan.fr\/spore"},{"key":"74_CR16","unstructured":"Organization for the Advancement of Structured Information Standards, SAML V2.0 OASIS Standard Specification (2007), \n                    \n                      http:\/\/saml.xml.org\/"},{"key":"74_CR17","unstructured":"Organization for the Advancement of Structured Information Standards, OASIS Web Services Security, WSS (2006), \n                    \n                      http:\/\/saml.xml.org\/"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01399-7_74","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T20:30:32Z","timestamp":1551990632000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01399-7_74"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642013980","9783642013997"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01399-7_74","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}