{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:58:32Z","timestamp":1725548312763},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041167"},{"type":"electronic","value":"9783642041174"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-04117-4_19","type":"book-chapter","created":{"date-parts":[[2010,2,22]],"date-time":"2010-02-22T16:44:00Z","timestamp":1266857040000},"page":"351-382","source":"Crossref","is-referenced-by-count":0,"title":["Security of Service Networks"],"prefix":"10.1007","author":[{"given":"Theo","family":"Dimitrakos","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"David","family":"Brossard","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pierre","family":"de Leusse","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Srijith K.","family":"Nair","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"The long nimbus, from The Economist, Oct 23rd (2008)"},{"issue":"2","key":"19_CR2","first-page":"86","volume":"26","author":"W.G. Glass","year":"2008","unstructured":"W.G.\u00a0Glass: BTs Matrix Architecture, BT Technol. J. 26(2), 86\u201396 (2008)","journal-title":"BT Technol. J."},{"key":"19_CR3","unstructured":"Seeley 2007, Web Services news, SearchWebServices.com, February 2007"},{"issue":"1","key":"19_CR4","first-page":"71","volume":"26","author":"P. Deans","year":"2008","unstructured":"P.\u00a0Deans, R.\u00a0Wiseman: Service oriented infrastructure: technology and standards for integration, BT Technol. J. 26(1), 71\u201378 (2008)","journal-title":"BT Technol. J."},{"issue":"2","key":"19_CR5","first-page":"87","volume":"26","author":"P. Deans","year":"2009","unstructured":"P.\u00a0Deans, R.\u00a0Wiseman: Service-Oriented Infrastructure: Proof of Concept Demonstrator, BT Technol. J. 26(2), 87\u2013104 (2009)","journal-title":"BT Technol. J."},{"key":"19_CR6","volume-title":"eAdoption and the Knowledge Economy","author":"T. Dimitrakos","year":"2004","unstructured":"T.\u00a0Dimitrakos, P.\u00a0Kearney, D.\u00a0Goldby: Towards a\u00a0Trust and Contract Management Framework for Dynamic Virtual Organisations. In: eAdoption and the Knowledge Economy, ed. by P.\u00a0Cunningham, M.\u00a0Cunningham (IOS Press, Amsterdam 2004)"},{"key":"19_CR7","unstructured":"J.\u00a0Wittgreffe, P.\u00a0Warren: Editorial, BT Technol. J. 26(2), pp. (2008)"},{"issue":"1","key":"19_CR8","first-page":"11","volume":"26","author":"C. Gresty","year":"2008","unstructured":"C.\u00a0Gresty, T.\u00a0Dimitrakos, G.\u00a0Thanos, P.\u00a0Warren: Meeting Customer Needs, BT Technol. J. 26(1), 11\u201324 (2008)","journal-title":"BT Technol. J."},{"key":"19_CR9","unstructured":"D.W. Cearley et al: Gartner\u2019s Positions on the Five Hottest IT Topics and Trends in 2005. Gartner Research Report, May 2005. ID Number: G00125868."},{"key":"19_CR10","unstructured":"T. Dimitrakos et al.: TrustCoM \u2013 A rust and Contract Management Framework enabling Secure Collaborations in Dynamic Virtual Organisations, ERCIM News No. 59 (2004)"},{"key":"19_CR11","unstructured":"T. Dimitrakos: TrustCoM Scientific and Technological Roadmap. Restricted TrustCoM deliverable available upon request. Contact: theo.dimitrakos@bt.com"},{"key":"19_CR12","unstructured":"BEinGRID project resources: Website \n                  www.beingrid.eu\n                  \n                 \u2013 Gridipedia repository \n                  www.gridipedia.eu"},{"key":"19_CR13","unstructured":"BEinGRID consortium: Better Business Using Grid Solutions. Eighteen Successful Case Studies from BEinGRID. Booklet available at: \n                  http:\/\/www.beingrid.eu\/casestudies.html\n                  \n                . See also BEinGRID industry days website: \n                  http:\/\/www.beingrid.eu\/beingridindustrydays.html"},{"key":"19_CR14","unstructured":"A. Maierhofer, T. Dimitrakos, L. Titkov, D.\u00a0Brossard: Extendable and Adaptive Message-Level Security Enforcement Framework, ICNS 2006, IEEE Comp. Soc. (2006) p. 72"},{"issue":"4","key":"19_CR15","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s10550-006-0011-3","volume":"23","author":"T. Dimitrakos","year":"2005","unstructured":"T.\u00a0Dimitrakos, I.\u00a0Djordjevic: A note on the anatomy of federation, BT Technol. J. 23(4), 89\u2013106 (2005)","journal-title":"BT Technol. J."},{"key":"19_CR16","unstructured":"UUID, RFC 4122, \n                  http:\/\/www.ietf.org\/rfc\/rfc4122.txt"},{"issue":"2","key":"19_CR17","first-page":"105","volume":"26","author":"T. Dimitrakos","year":"2009","unstructured":"T.\u00a0Dimitrakos, D.\u00a0Brossard, P.\u00a0de Leusse: Securing Business Operations in SOA, BT Technol. J. 26(2), 105\u2013125 (2009)","journal-title":"BT Technol. J."},{"key":"19_CR18","unstructured":"TrustCoM consortium: Final TrustCoM Reference implementation and associated tools and user manual, available at \n                  http:\/\/www.eu-trustcom.com\/"},{"key":"19_CR19","unstructured":"OASIS. XACML 3.0 Core Specification (DRAFT), WD 6, 18 May 2008: eXtensible Access Control Markup Language (XACML) Version 3.0 (Core Specification and Schemas)"},{"key":"19_CR20","unstructured":"OASIS. XACML 3.0 Administration and Delegation Profile, WD 19, 10 Oct 2007: XACML v3.0 (DRAFT) Administration and Delegation Profile Version 1.0"},{"key":"19_CR21","unstructured":"OASIS. XACML 2.0 Core: eXtensible Access Control Markup Language (XACML) Version 2.0"},{"key":"19_CR22","unstructured":"T. Dimitrakos, D. Brossard: Improvements in policy driven computer systems, European patent application submission, March 31st, 2008"},{"key":"19_CR23","unstructured":"TrustCoM consortium: TrustCoM Framework for Trust, Security and Contract Management V4, available at \n                  http:\/\/www.eu-trustcom.com\/"},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"P.\u00a0de Leusse, P.\u00a0Periorellis, P.\u00a0Watson, A.\u00a0Maierhofer: Secure & Rapid Composition of Infrastructure Services in the Cloud, The Second International Conference on Sensor Technologies and Applications, SENSORCOMM 2008, Cap Esterel, IEEE Computer Society (2008)","DOI":"10.1109\/SENSORCOMM.2008.130"},{"key":"19_CR25","unstructured":"P.\u00a0de Leusse, P.\u00a0Periorellis, P.\u00a0Watson, T.\u00a0Dimitrakos: A semi autonomic infrastructure to manage non functional properties of a service, UK e-Science All Hands Meeting 2008, Edinburgh (2008)"},{"key":"19_CR26","unstructured":"P.\u00a0de Leusse, P.\u00a0Periorellis, T.\u00a0Dimitrakos, P.\u00a0Watson: An Architecture for Non Functional Properties Management in Distributed Computing, 3rd Int. Conference on Software and Data Technologies (ICSOFT 2008) (2008)"},{"key":"19_CR27","unstructured":"P. de Leusse, P. Periorellis, P. Watson: Enterprise Service Bus: An overview, in Technical Reports, ed. by S.o.C. Science, Newcastle University (2007)"},{"key":"19_CR28","unstructured":"BT\u2019s 21st Century Network. Information site at \n                  http:\/\/www.btplc.com\/21CN\/"},{"key":"19_CR29","unstructured":"Burton Group: Analyst resources and publications on Identity as a Service (IaaS): \n                  http:\/\/www.burtongroup.com\/Research\/Topics\/IdentityAsAService.aspx"},{"key":"19_CR30","unstructured":"Fischer International: Identity Management as a Service: A simple solution to a complex problem, whitepaper available at \n                  http:\/\/www.fischerinternational.com\/press\/white_papers.htm"}],"container-title":["Handbook of Information and Communication Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04117-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,12]],"date-time":"2019-03-12T18:16:16Z","timestamp":1552414576000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04117-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642041167","9783642041174"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04117-4_19","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}