{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:41:19Z","timestamp":1742953279288,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642040856"},{"type":"electronic","value":"9783642040863"}],"license":[{"start":{"date-parts":[[2009,10,20]],"date-time":"2009-10-20T00:00:00Z","timestamp":1255996800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,10,20]],"date-time":"2009-10-20T00:00:00Z","timestamp":1255996800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-04086-3_4","type":"book-chapter","created":{"date-parts":[[2009,10,19]],"date-time":"2009-10-19T09:44:34Z","timestamp":1255945474000},"page":"75-102","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Aspects of General Security &amp; Trust"],"prefix":"10.1007","author":[{"given":"David","family":"Brossard","sequence":"first","affiliation":[]},{"given":"Theo","family":"Dimitrakos","sequence":"additional","affiliation":[]},{"given":"Angelo","family":"Gaeta","sequence":"additional","affiliation":[]},{"given":"St\u00e9phane","family":"Mouton","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,10,20]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1145\/1035429.1035434","volume-title":"Proceedings of the 2003 ACM Workshop on Formal Methods in Security Engineering","author":"S. Braynov","year":"2003","unstructured":"S. Braynov, M. Jadiwala, Representation and analysis of coordinated attacks, in Proceedings of the 2003 ACM Workshop on Formal Methods in Security Engineering (ACM, New York, 2003), pp.\u00a043\u201351"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"D. Brossard, T. Dimitrakos, M. Colombo, Common Capabilities for Trust & Security in Service Oriented Infrastructures, eChallenges 2008","DOI":"10.1007\/978-3-642-02056-8_22"},{"issue":"1","key":"4_CR3","first-page":"71","volume":"26","author":"P. Deans","year":"2008","unstructured":"P. Deans, R. Wiseman, Service oriented infrastructure: technology and standards for integration. BT Technology Journal 26(1), 71\u201378 (2008)","journal-title":"BT Technology Journal"},{"key":"4_CR4","unstructured":"P. Deans, R. Wiseman, Service-oriented infrastructure: proof of concept demonstrator. BT Technology Journal 26(2) (2009)"},{"key":"4_CR5","unstructured":"T. Dimitrakos, TrustCoM Scientific and Technological Roadmap. Restricted TrustCoM deliverable available upon request. Contact: theo.dimitrakos@bt.com"},{"issue":"4","key":"4_CR6","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s10550-006-0011-3","volume":"23","author":"T. Dimitrakos","year":"2005","unstructured":"T. Dimitrakos, I. Djordjevic, A note on the anatomy of federation. BT Technology Journal 23(4), 89\u2013106 (2005). Special Issue on Identity Management","journal-title":"BT Technology Journal"},{"key":"4_CR7","volume-title":"eAdoption and the Knowledge Economy","author":"T. Dimitrakos","year":"2004","unstructured":"T. Dimitrakos, P. Kearney, D. Golby, Towards a trust and contract management framework for dynamic virtual organisations, in eAdoption and the Knowledge Economy (IOS Press, Amsterdam, 2004)"},{"key":"4_CR8","unstructured":"T. Dimitrakos, D. Brossard, P. de Leusse, Securing business operations in an SOA. BT Technology Journal 26(2) (2009)"},{"key":"4_CR9","unstructured":"Distributed Access Control in a Service-Oriented Infrastructure, a BEinGRID Security Whitepaper, available from Gridipedia"},{"key":"4_CR10","unstructured":"I. Djordjevic, Use case\/Requirements elicitation for BE09, Grid Trust Deliverable, British Telecom, December 2006"},{"key":"4_CR11","unstructured":"C. Geuer-Pollmann, How to make a federation manageable, in Proc. of Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, 19\u201321 Sept. 2005"},{"key":"4_CR12","unstructured":"Federation Management & Identity Brokerage in a Service-Oriented Infrastructure, a BEinGRID Security Whitepaper, available from Gridipedia"},{"key":"4_CR13","unstructured":"Managing, Contextualizing, & Exposing Enterprise Services: a service-oriented Governance Gateway, a BEinGRID Security Whitepaper, available from Gridipedia"},{"key":"4_CR14","unstructured":"OASIS, XACML 2.0 Core: eXtensible Access Control Markup Language (XACML) Version\u00a02.0"},{"key":"4_CR15","unstructured":"OASIS, XACML 3.0 Administration and Delegation Profile, WD 19, 10 Oct. 2007: XACML v3.0 (DRAFT) Administration and Delegation Profile Version\u00a01.0"},{"key":"4_CR16","unstructured":"OASIS, XACML 3.0 Core Specification (DRAFT), WD 6, 18 May 2008: eXtensible Access Control Markup Language (XACML) Version\u00a03.0 (Core Specification and Schemas)"},{"key":"4_CR17","unstructured":"Securing the Service-Oriented Infrastructure: exposing web services with XML Security Gateways, a BEinGRID Security Whitepaper, available from Gridipedia"},{"key":"4_CR18","unstructured":"L. Titkov, D1.1.1\u2014Requirements Analysis & Technology Evaluation for General Security and Trust"},{"key":"4_CR19","unstructured":"http:\/\/www.axiomatics.com"},{"key":"4_CR20","unstructured":"http:\/\/www.beingrid.eu\/be2.html"},{"key":"4_CR21","unstructured":"http:\/\/www.beingrid.eu\/be9.html"},{"key":"4_CR22","unstructured":"http:\/\/www.beingrid.eu\/be25.html"},{"key":"4_CR23","unstructured":"http:\/\/www.beingrid.eu\/be21travelcrm.html"},{"key":"4_CR24","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Abstract_factory_pattern"}],"container-title":["Service Oriented Infrastructures and Cloud Service Platforms for the Enterprise"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04086-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T20:16:52Z","timestamp":1676060212000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-04086-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10,20]]},"ISBN":["9783642040856","9783642040863"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04086-3_4","relation":{},"subject":[],"published":{"date-parts":[[2009,10,20]]},"assertion":[{"value":"20 October 2009","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}