{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T03:43:36Z","timestamp":1743047016613,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642243950"},{"type":"electronic","value":"9783642243967"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24396-7_11","type":"book-chapter","created":{"date-parts":[[2011,9,14]],"date-time":"2011-09-14T05:34:51Z","timestamp":1315978491000},"page":"126-141","source":"Crossref","is-referenced-by-count":0,"title":["From ASTD Access Control Policies to WS-BPEL Processes Deployed in a SOA Environment"],"prefix":"10.1007","author":[{"given":"Michel Embe","family":"Jiague","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marc","family":"Frappier","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fr\u00e9d\u00e9ric","family":"Gervais","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"R\u00e9gine","family":"Laleau","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Richard","family":"St-Denis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Basin, D.A., Burri, S.J., Karjoth, G.: Dynamic enforcement of abstract separation of duty constraints. In: 14th European Symposium on Research in Computer Security, pp. 250\u2013267 (2009)","DOI":"10.1007\/978-3-642-04444-1_16"},{"key":"11_CR2","unstructured":"Konopacki, P., Frappier, M., Laleau, R.: Expressing access control policies with an event-based approach. Technical Report TR-LACL-2010-6, LACL (Laboratory of Algorithms, Complexity and Logic), University of Paris-Est (2010)"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Konopacki, P., Frappier, M., Laleau, R.: Mod\u00e9lisation de politiques de s\u00e9curit\u00e9 \u00e0 l\u2019aide d\u2019une alg\u00e8bre de processus. RSTI - Ing\u00e9nierie des syst\u00e8mes d\u2019information 15(3), 113\u2013136 (2010)","DOI":"10.3166\/isi.15.3.113-136"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Yao, W., Moody, K., Bacon, J.: A model of OASIS role-based access control and its support for active security. In: 6th ACM Symposium on Access Control Models and Technologies, pp. 171\u2013181 (2001)","DOI":"10.1145\/373256.373294"},{"issue":"3","key":"11_CR5","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/0167-6423(87)90035-9","volume":"8","author":"D. Harel","year":"1987","unstructured":"Harel, D.: Statecharts: A visual formalism for complex systems. Science of Computer Programming\u00a08(3), 231\u2013274 (1987)","journal-title":"Science of Computer Programming"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-642-16265-7_18","volume-title":"Integrated Formal Methods","author":"J. Milhau","year":"2010","unstructured":"Milhau, J., Frappier, M., Gervais, F., Laleau, R.: Systematic translation rules from astd to event-B. In: M\u00e9ry, D., Merz, S. (eds.) IFM 2010. LNCS, vol.\u00a06396, pp. 245\u2013259. Springer, Heidelberg (2010)"},{"key":"11_CR7","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139195881","volume-title":"Modeling in Event-B","author":"J.R. Abrial","year":"2010","unstructured":"Abrial, J.R.: Modeling in Event-B. Cambridge University Press, Cambridge (2010)"},{"key":"11_CR8","unstructured":"Frappier, M., Gervais, F., Laleau, R., Fraikin, B.: Algebraic state transition diagrams. Technical Report\u00a024, D\u00e9partement d\u2019informatique, Universit\u00e9 de Sherbrooke (2008)"},{"key":"11_CR9","unstructured":"OASIS: eXtensible Access Control Markup Language (XACML) Version 2.0. OASIS (2005)"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Embe Jiague, M., Frappier, M., Gervais, F., Konopacki, P., Milhau, J., Laleau, R., St-Denis, R.: Model-driven engineering of functional security policies. In: International Conference on Enterprise Information Systems, vol.\u00a03, pp. 374\u2013379 (2010)","DOI":"10.5220\/0003019403740379"},{"issue":"3","key":"11_CR11","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s11334-008-0064-1","volume":"4","author":"M. Frappier","year":"2008","unstructured":"Frappier, M., Gervais, F., Laleau, R., Fraikin, B., St-Denis, R.: Extending statecharts with process algebra operators. Innovations in Systems and Software Engineering\u00a04(3), 285\u2013292 (2008)","journal-title":"Innovations in Systems and Software Engineering"},{"key":"11_CR12","unstructured":"OASIS: Web Services Business Process Execution Language Version 2.0. OASIS (2007)"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"A\u00eft-Sadoune, I., A\u00eft-Ameur, Y.: Stepwise design of BPEL Web services compositions, an Event B refinement based approach. In: 8th ACIS International Conference on Software Engineering Research, Management and Applications, pp. 51\u201368 (2010)","DOI":"10.1007\/978-3-642-13273-5_4"},{"issue":"6","key":"11_CR14","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/s10009-010-0145-y","volume":"12","author":"J.R. Abrial","year":"2010","unstructured":"Abrial, J.R., Butler, M., Hallerstede, S., Hoang, T.S., Mehta, F., Voisin, L.: Rodin: an open toolset for modelling and reasoning in Event-B. Software Tools for Technology Transfer\u00a012(6), 447\u2013466 (2010)","journal-title":"Software Tools for Technology Transfer"},{"key":"11_CR15","unstructured":"INCITS: Role Base Access Control. ANSI (2004)"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Sohr, K., Mustafa, T., Bao, X., Ahn, G.J.: Enforcing role-based access control policies in Web services with UML and OCL. In: 24th Annual Computer Security Applications Conference, pp. 257\u2013266 (2008)","DOI":"10.1109\/ACSAC.2008.35"},{"key":"11_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-642-01364-5_11","volume-title":"Web Services and Formal Methods","author":"M. Kolund\u017eija","year":"2009","unstructured":"Kolund\u017eija, M.: Security types for sessions and pipelines. In: Bruni, R., Wolf, K. (eds.) WS-FM 2008. LNCS, vol.\u00a05387, pp. 175\u2013190. Springer, Heidelberg (2009)"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Boreale, M., Bruni, R., Nicola, R., Loreti, M.: Sessions and pipelines for structured service programming. In: 10th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems, pp. 19\u201338 (2008)","DOI":"10.1007\/978-3-540-68863-1_3"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Hassan, W., Slimani, N., Adi, K., Logrippo, L.: Secrecy UML method for model transformations. In: 2nd International Conference ABZ Short Papers, pp. 16\u201321 (2010)","DOI":"10.1007\/978-3-642-11811-1_35"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Li, N., Wang, Q.: Beyond separation of duty: an algebra for specifying high-level security policies. In: 13th ACM Conference on Computer and Communications Security, pp. 356\u2013369 (2006)","DOI":"10.1145\/1180405.1180449"},{"issue":"8","key":"11_CR21","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1145\/359576.359585","volume":"21","author":"C.A.R. Hoare","year":"1978","unstructured":"Hoare, C.A.R.: Communicating sequential processes. Communications of the ACM\u00a021(8), 666\u2013677 (1978)","journal-title":"Communications of the ACM"},{"issue":"3","key":"11_CR22","doi-asserted-by":"publisher","first-page":"20","DOI":"10.4018\/jwsr.2008070102","volume":"5","author":"F. Paci","year":"2008","unstructured":"Paci, F., Bertino, E., Crampton, J.: An access-control framework for WS-BPEL. International Journal of Web Services Research\u00a05(3), 20\u201343 (2008)","journal-title":"International Journal of Web Services Research"},{"issue":"2","key":"11_CR23","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., Samarati, P., Sapino, M.L., Subrahmanian, V.S.: Flexible support for multiple access control policies. ACM Transactions on Database Systems\u00a026(2), 214\u2013260 (2001)","journal-title":"ACM Transactions on Database Systems"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Wong, P.Y.H., Gibbons, J.: A process-algebraic approach to workflow specification and refinement. In: Software Composition, pp. 51\u201365 (2007)","DOI":"10.1007\/978-3-540-77351-1_5"},{"issue":"1","key":"11_CR25","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1142\/S0218126698000043","volume":"8","author":"W.M.P. Aalst van der","year":"1998","unstructured":"van der Aalst, W.M.P.: The application of Petri nets to workflow management. The Journal of Circuits, Systems and Computers\u00a08(1), 21\u201366 (1998)","journal-title":"The Journal of Circuits, Systems and Computers"},{"key":"11_CR26","first-page":"35","volume":"1","author":"P. Massuthe","year":"2005","unstructured":"Massuthe, P., Reisig, W., Schmidt, K.: An operating guideline approach to the SOA. Annals of Mathematics, Computing & Teleinformatics\u00a01, 35\u201343 (2005)","journal-title":"Annals of Mathematics, Computing & Teleinformatics"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2010 Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24396-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T22:18:44Z","timestamp":1741645124000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24396-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642243950","9783642243967"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24396-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}