{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:32:54Z","timestamp":1742913174392,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540749738"},{"type":"electronic","value":"9783540749745"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17358-5_20","type":"book-chapter","created":{"date-parts":[[2010,11,24]],"date-time":"2010-11-24T12:06:22Z","timestamp":1290600382000},"page":"288-302","source":"Crossref","is-referenced-by-count":1,"title":["Combining Enforcement Strategies in Service Oriented Architectures"],"prefix":"10.1007","author":[{"given":"Gabriela","family":"Gheorghe","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bruno","family":"Crispo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Daniel","family":"Schleicher","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tobias","family":"Anstett","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Frank","family":"Leymann","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ralph","family":"Mietzner","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ganna","family":"Monakova","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"20_CR1","series-title":"LNCS","first-page":"63","volume-title":"Trust Management IV, IFIP Advances in Information and Communication Technology","author":"G. Gheorghe","year":"2010","unstructured":"Gheorghe, G., Neuhaus, S., Crispo, B.: xESB: An enterprise service bus for access and usage control policy enforcement. In: Uehara, T. (ed.) IFIPTM 2010. LNCS, vol.\u00a0321, pp. 63\u201378. Springer, Heidelberg (2010)"},{"issue":"1","key":"20_CR2","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.entcs.2007.10.012","volume":"197","author":"T. Goovaerts","year":"2008","unstructured":"Goovaerts, T., De Win, B., Joosen, W.: Infrastructural support for enforcing and managing distributed application-level policies. Electron. Notes Theor. Comput. Sci.\u00a0197(1), 31\u201343 (2008)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"20_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/978-3-540-93851-4_37","volume-title":"Service-Oriented Computing - ICSOC 2007 Workshops","author":"R. Khalaf","year":"2009","unstructured":"Khalaf, R., Karastoyanova, D., Leymann, F.: Pluggable framework for enabling the execution of extended bpel behavior. In: Di Nitto, E., Ripeanu, M. (eds.) ICSOC 2007. LNCS, vol.\u00a04907, pp. 376\u2013387. Springer, Heidelberg (2009)"},{"key":"20_CR4","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/ECOWS.2008.25","volume-title":"Proceedings of the 6th IEEE European Conference on Web Services 2008","author":"T. Lessen van","year":"2008","unstructured":"van Lessen, T., Leymann, F., Mietzner, R., Nitzsche, J., Schleicher, D.: A Management Framework for WS-BPEL. In: Proceedings of the 6th IEEE European Conference on Web Services 2008, pp. 187\u2013196. IEEE Computer Society, Los Alamitos (November 2008)"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Leune, K., van den Heuvel, W.J., Papazoglou, M.: Exploring a multi-faceted framework for soc: how to develop secure web-service interactions? In: Proc. 14th Intl. Workshop on Research Issues on Data Engineering, pp. 56\u201361 (March 2004)","DOI":"10.1109\/RIDE.2004.1281703"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Maierhofer, A., Dimitrakos, T., Titkov, L., Brossard, D.: Extendable and adaptive message-level security enforcement framework. In: International conference on Networking and Services, ICNS 2006, pp. 72\u201372 (2006)","DOI":"10.1109\/ICNS.2006.50"},{"issue":"15","key":"20_CR7","first-page":"2916","volume":"15","author":"M. Hafner","year":"2009","unstructured":"Hafner, M., Mukhtiar Memon, R.B.: SeAAS - a reference architecture for security services in SOA. Journal of Universal Computer Science\u00a015(15), 2916\u20132936 (2009)","journal-title":"Journal of Universal Computer Science"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Moser, O., Rosenberg, F., Dustdar, S.: Non-intrusive monitoring and service adaptation for ws-bpel. In: WWW, pp. 815\u2013824 (2008)","DOI":"10.1145\/1367497.1367607"},{"key":"20_CR9","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1023\/A:1008604709862","volume":"10","author":"M. Reichert","year":"1998","unstructured":"Reichert, M., Dadam, P.: Adeptflex: Supporting dynamic changes of workflow without loosing control. Journal of Intelligent Information Systems\u00a010, 93\u2013129 (1998)","journal-title":"Journal of Intelligent Information Systems"},{"key":"20_CR10","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-642-00899-3_7","volume":"2","author":"M. Reichert","year":"2009","unstructured":"Reichert, M., Rinderle-Ma, S., Dadam, P.: Flexibility in process-aware information systems. T. Petri Nets and Other Models of Concurrency\u00a02, 115\u2013135 (2009)","journal-title":"T. Petri Nets and Other Models of Concurrency"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Svirskas, A., Isachenkova, J., Molva, R.: Towards secure and trusted collaboration environment for european public sector. In: Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2007. International Conference on, pp. 49\u201356 (2007)","DOI":"10.1109\/COLCOM.2007.4553808"},{"key":"20_CR12","volume-title":"Privacy Aware Knowledge Discovery: Novel Applications and New Techniques","author":"T. Trojer","year":"2010","unstructured":"Trojer, T., Kwong Lee, C., Fung, B.C.M., Narupiyakul, L., Hung, P.C.K.: Privacy-aware health information sharing. In: Privacy Aware Knowledge Discovery: Novel Applications and New Techniques, Chapman and Hall\/CRC Press, Boca Raton (2010)"},{"key":"20_CR13","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1109\/ANSS-41.2008.30","volume-title":"ANSS-41 2008: Proceedings of the 41st Annual Simulation Symposium (anss-41 2008)","author":"W.T. Tsai","year":"2008","unstructured":"Tsai, W.T., Zhou, X., Chen, Y.: Soa simulation and verification by event-driven policy enforcement. In: ANSS-41 2008: Proceedings of the 41st Annual Simulation Symposium (anss-41 2008), pp. 165\u2013172. IEEE Computer Society, Washington (2008)"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"United States Code: Sarbanes-Oxley Act of 2002, pl 107-204, 116 stat 745. Codified in Sections 11, 15, 18, 28, and 29 USC (July 2002)","DOI":"10.2307\/1342618"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing \u2013 ICSOC 2007"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17358-5_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T10:26:58Z","timestamp":1559816818000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17358-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783540749738","9783540749745"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17358-5_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}