{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:50:32Z","timestamp":1725490232567},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540749738"},{"type":"electronic","value":"9783540749745"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10383-4_27","type":"book-chapter","created":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T14:49:58Z","timestamp":1259074198000},"page":"373-388","source":"Crossref","is-referenced-by-count":16,"title":["Incorporating Security Requirements into Service Composition: From Modelling to Execution"],"prefix":"10.1007","author":[{"given":"Andre R. R.","family":"Souza","sequence":"first","affiliation":[]},{"given":"Bruno L. B.","family":"Silva","sequence":"additional","affiliation":[]},{"given":"Fernando A. A.","family":"Lins","sequence":"additional","affiliation":[]},{"given":"Julio C.","family":"Damasceno","sequence":"additional","affiliation":[]},{"given":"Nelson S.","family":"Rosa","sequence":"additional","affiliation":[]},{"given":"Paulo R. M.","family":"Maciel","sequence":"additional","affiliation":[]},{"given":"Robson W. A.","family":"Medeiros","sequence":"additional","affiliation":[]},{"given":"Bryan","family":"Stephenson","sequence":"additional","affiliation":[]},{"given":"Hamid R.","family":"Motahari-Nezhad","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Caio","family":"Northfleet","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","unstructured":"Apache Software Foundation (2008), Apache Rampart \u2013 Axis2 Security Model, \n                    \n                      http:\/\/ws.apache.org\/rampart\/\n                    \n                    \n                   (last visit at May 3, 2009)"},{"key":"27_CR2","unstructured":"Apache Software Foundation. Apache Orchestration Director Engine (ODE), \n                    \n                      http:\/\/ode.apache.org\/\n                    \n                    \n                   (last visit at May 3, 2009)"},{"issue":"1","key":"27_CR3","first-page":"39","volume":"15","author":"D. Basin","year":"2006","unstructured":"Basin, D., et al.: Model driven security: From UML models to access control infrastructures, ACM Trans. Software Eng. Methodology\u00a015(1), 39\u201391 (2006)","journal-title":"Methodology"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Carminati, B., Ferrari, E., Hung, P.C.K.: Security Conscious Web Service Composition. In: Proc. International Conference on Web Services ICWS 2006, pp. 489\u2013496 (2006)","DOI":"10.1109\/ICWS.2006.115"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Charfi, A., Mezini, M.: Using aspects for security engineering of Web service compositions. In: Proc. IEEE International Conference on Web Services ICWS 2005, pp. 59\u201366 (2005)","DOI":"10.1109\/ICWS.2005.126"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Chollet, S., Lalanda, P.: Security Specification at Process Level. In: Proc. IEEE International Conference on Services Computing (SCC 2008), pp. 165\u2013172 (2008)","DOI":"10.1109\/SCC.2008.51"},{"key":"27_CR7","unstructured":"Eclipse Foundation (2008), The BPMN Modeler, \n                    \n                      http:\/\/www.eclipse.org\/bpmn"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Garcia, D.Z.G., Felgar de Toledo, M.B.: Ontology-Based Security Policies for Supporting the Management of Web Service Business Processes. In: Proc. IEEE International Conference on Semantic Computing, pp. 331\u2013338 (2008)","DOI":"10.1109\/ICSC.2008.35"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Han, J., Kowalczyk, R., Khan, K.M.: Security-Oriented Service Composition and Evolution. In: Proc. 13th Asia Pacific Software Engineering Conference APSEC 2006 (2006)","DOI":"10.1109\/APSEC.2006.51"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Menzel, M., Homas, I., Meinel, C.: Security Requirements Specification in Service-Oriented Business Process Management. In: Proc. ARES 2009 (2009)","DOI":"10.1109\/ARES.2009.90"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Neubauer, T., Heurix, J.: Defining Secure Business Processes with Respect to Multiple Objectives. In: Proc. ARES 2008, pp. 187\u2013194 (2008)","DOI":"10.1109\/ARES.2008.174"},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Neubauer, T., Heurix, J.: Objective Types for the Valuation of Secure Business Processes. In: Proc. Seventh IEEE\/ACIS International Conference on Computer and Information Science ICIS 2008, pp. 231\u2013236 (2008)","DOI":"10.1109\/ICIS.2008.64"},{"key":"27_CR13","unstructured":"Ouyang, C., et al.: Translating BPMN to BPEL (2006), \n                    \n                      http:\/\/code.google.com\/p\/bpmn2bpel\/\n                    \n                    \n                   (last visit: May 10, 2009)"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Rodriguez, A., Fern\u00e1ndez-Medina, E., Piattini, M.: A BPMN Extension for the Modeling of Security Requirements in Business Processes. IEICE - Trans. Inf. Syst.\u00a0E90-D(4), 745\u2013752 (2007)","DOI":"10.1093\/ietisy\/e90-d.4.745"},{"key":"27_CR15","unstructured":"Rosa, N.S.: NFi: An Architecture-based Approach for Treating Non-Functional Properties of Dynamic Distributed Systems, PhD thesis, Centre of Informatics, Federal University of Pernambuco (2001)"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Song, H., Sun, Y., Sun, Y., Yin, Y.: Dynamic Weaving of Security Aspects in Service Composition. In: Proc. Second IEEE International Workshop Service-Oriented System Engineering SOSE 2006, pp. 189\u2013196 (2006)","DOI":"10.1109\/SOSE.2006.14"},{"key":"27_CR17","unstructured":"Tong, K.K.L.: Developing Web Services with Apache Axis2, TipTec Development (2008)"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Wang, X., Zhang, Y., Shi, H.: Access Control for Human Tasks in Service Oriented Architecture. In: Proc. of ICEBE 2008, pp. 455\u2013460 (2008)","DOI":"10.1109\/ICEBE.2008.89"},{"key":"27_CR19","unstructured":"White, S.A.: Introduction to BPMN, Technical report, IBM Corporation (2004)"},{"key":"27_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/978-3-540-89652-4_5","volume-title":"Service-Oriented Computing \u2013 ICSOC 2008","author":"T. Phan","year":"2008","unstructured":"Phan, T., Han, J., Schneider, J.G., Wilson, K.: Quality-Driven Business Policy Specification and Refinement for Service-Oriented Systems. In: Bouguettaya, A., Krueger, I., Margaria, T. (eds.) ICSOC 2008. LNCS, vol.\u00a05364, pp. 5\u201321. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing \u2013 ICSOC 2007"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10383-4_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,10]],"date-time":"2019-03-10T16:51:54Z","timestamp":1552236714000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10383-4_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783540749738","9783540749745"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10383-4_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}