{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T04:32:28Z","timestamp":1744173148354,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":100,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642332593"},{"type":"electronic","value":"9783642332609"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33260-9_1","type":"book-chapter","created":{"date-parts":[[2012,9,20]],"date-time":"2012-09-20T08:27:01Z","timestamp":1348129621000},"page":"1-29","source":"Crossref","is-referenced-by-count":6,"title":["Formalising Security in Ubiquitous and Cloud Scenarios"],"prefix":"10.1007","author":[{"given":"Chiara","family":"Bodei","sequence":"first","affiliation":[]},{"given":"Pierpaolo","family":"Degano","sequence":"additional","affiliation":[]},{"given":"Gian-Luigi","family":"Ferrari","sequence":"additional","affiliation":[]},{"given":"Letterio","family":"Galletta","sequence":"additional","affiliation":[]},{"given":"Gianluca","family":"Mezzetti","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Cloud cryptography group at Microsoft Research, http:\/\/research.microsoft.com\/en-us\/projects\/cryptocloud\/"},{"key":"1_CR2","unstructured":"UDDI technical white paper. Tech. rep., W3C (2000)"},{"key":"1_CR3","unstructured":"eXtensible Access Control Markup Language (XACML) Version 2.0. Tech. rep., OASIS (2005)"},{"key":"1_CR4","unstructured":"The future of cloud computing. Tech. rep., European Commision, Information Society and Media (2010)"},{"key":"1_CR5","unstructured":"Achermann, F., Lumpe, M., Schneider, J., Nierstrasz, O.: PICCOLA\u2014a small composition language. In: Formal Methods for Distributed Processing, pp. 403\u2013426. Cambridge University Press (2001)"},{"key":"1_CR6","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1145\/1007568.1007632","volume-title":"Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, SIGMOD 2004","author":"R. Agrawal","year":"2004","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, SIGMOD 2004, pp. 563\u2013574. ACM, New York (2004), http:\/\/doi.acm.org\/10.1145\/1007568.1007632"},{"key":"1_CR7","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-642-02633-1_9","volume-title":"Advances in Information Security and Its Application","author":"F. Al-Neyadi","year":"2009","unstructured":"Al-Neyadi, F., Abawajy, J.H.: Context-Based E-Health System Access Control Mechanism. In: Park, J.H., Zhan, J., Lee, C., Wang, G., Kim, T.-H., Yeo, S.-S. (eds.) ISA 2009. CCIS, vol.\u00a036, pp. 68\u201377. Springer, Heidelberg (2009)"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Alonso, G., Casati, F., Kuno, H., Machiraju, V.: Web Services: Concepts, Architectures and Applications. Springer (2004)","DOI":"10.1007\/978-3-662-10876-5"},{"key":"1_CR9","unstructured":"Amazon.com Inc.: Aws customer agreement, http:\/\/aws.amazon.com\/agreement\/"},{"key":"1_CR10","unstructured":"Amazon.com Inc.: Overview of Amazon Web Services (2010), http:\/\/aws.amazon.com\/whitepapers\/"},{"key":"1_CR11","unstructured":"Anderson, S., et al.: Web Services Trust Language (WS-Trust) (2005)"},{"key":"1_CR12","unstructured":"Andrews, T., et al.: Business Process Execution Language for Web Services (BPEL4WS), Version 1.1 (2003)"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Appeltauer, M., Hirschfeld, R., Haupt, M., Masuhara, H.: ContextJ: Context-oriented programming with java. Computer Software\u00a028(1) (2011)","DOI":"10.1145\/2068736.2068741"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Atkinson, B., et al.: Web Services Security (WS-Security) (2002)","DOI":"10.1016\/S1361-3723(02)00407-4"},{"issue":"15","key":"1_CR15","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L. Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The internet of things: A survey. Computer Networks\u00a054(15), 2787\u20132805 (2010)","journal-title":"Computer Networks"},{"issue":"1-2","key":"1_CR16","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.tcs.2006.11.017","volume":"373","author":"F. Barbanera","year":"2007","unstructured":"Barbanera, F., Bugliesi, M., Dezani-Ciancaglini, M., Sassone, V.: Space-aware ambients and processes. Theor. Comput. Sci.\u00a0373(1-2), 41\u201369 (2007)","journal-title":"Theor. Comput. Sci."},{"key":"1_CR17","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/S1571-0661(04)00321-4","volume":"62","author":"F. Barbanera","year":"2001","unstructured":"Barbanera, F., Dezani-Ciancaglini, M., Salvo, I., Sassone, V.: A type inference algorithm for secure ambients. Electr. Notes Theor. Comput. Sci.\u00a062, 83\u2013101 (2001)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"issue":"5","key":"1_CR18","doi-asserted-by":"crossref","first-page":"799","DOI":"10.3233\/JCS-2009-0357","volume":"17","author":"M. Bartoletti","year":"2009","unstructured":"Bartoletti, M., Degano, P., Ferrari, G.L.: Planning and verifying service composition. Journal of Computer Security\u00a017(5), 799\u2013837 (2009)","journal-title":"Journal of Computer Security"},{"issue":"1","key":"1_CR19","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/TSE.2007.70740","volume":"34","author":"M. Bartoletti","year":"2008","unstructured":"Bartoletti, M., Degano, P., Ferrari, G.L., Zunino, R.: Semantics-based design for secure web services. IEEE Trans. Software Eng.\u00a034(1), 33\u201349 (2008)","journal-title":"IEEE Trans. Software Eng."},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Bartoletti, M., Degano, P., Ferrari, G.L., Zunino, R.: Local policies for resource usage analysis. ACM Trans. Program. Lang. Syst.\u00a031(6) (2009)","DOI":"10.1145\/1552309.1552313"},{"key":"1_CR21","unstructured":"Bartoletti, M., Zunino, R.: LocUsT: a tool for checking usage policies. Tech. Rep. TR-08-07, Dip. Informatica, Univ. Pisa (2008)"},{"key":"1_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-540-68265-3_3","volume-title":"Coordination Models and Languages","author":"K. Bhargavan","year":"2008","unstructured":"Bhargavan, K., Gordon, A.D., Narasamdya, I.: Service Combinators for Farming Virtual Machines. In: Lea, D., Zavattaro, G. (eds.) COORDINATION 2008. LNCS, vol.\u00a05052, pp. 33\u201349. Springer, Heidelberg (2008)"},{"key":"1_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-642-28641-4_2","volume-title":"Principles of Security and Trust","author":"B. Blanchet","year":"2012","unstructured":"Blanchet, B.: Security Protocol Verification: Symbolic and Computational Models. In: Degano, P., Guttman, J.D. (eds.) POST 2012. LNCS, vol.\u00a07215, pp. 3\u201329. Springer, Heidelberg (2012)"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Bodei, C., Dinh, V.D., Ferrari, G.L.: Safer in the clouds (extended abstract). In: Bliudze, S., Bruni, R., Grohmann, D., Silva, A. (eds.) ICE. EPTCS, vol.\u00a038, pp. 45\u201349 (2010)","DOI":"10.4204\/EPTCS.38.6"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Bodei, C., Dinh, V.D., Ferrari, G.L.: Predicting global usages of resources endowed with local policies. In: Mousavi, M.R., Ravara, A. (eds.) FOCLASA. EPTCS, vol.\u00a058, pp. 49\u201364 (2011)","DOI":"10.4204\/EPTCS.58.4"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Bonelli, E., Compagnoni, A., Gunter, E.: Typechecking safe process synchronization. In: Proc. Foundations of Global Ubiquitous Computing. ENTCS, vol.\u00a0138(1) (2005)","DOI":"10.1016\/j.entcs.2005.05.002"},{"key":"1_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/11841197_3","volume-title":"Web Services and Formal Methods","author":"M. Boreale","year":"2006","unstructured":"Boreale, M., Bruni, R., Caires, L., De Nicola, R., Lanese, I., Loreti, M., Martins, F., Montanari, U., Ravara, A., Sangiorgi, D., Vasconcelos, V., Zavattaro, G.: SCC: A Service Centered Calculus. In: Bravetti, M., N\u00fa\u00f1ez, M., Zavattaro, G. (eds.) WS-FM 2006. LNCS, vol.\u00a04184, pp. 38\u201357. Springer, Heidelberg (2006)"},{"key":"1_CR28","unstructured":"Box, D., et al.: Simple Object Access Protocol (SOAP) 1.1. WRC Note (2000)"},{"key":"1_CR29","unstructured":"Box, D., et al.: Web Services Policy Framework (WS-Policy) (2002)"},{"issue":"5","key":"1_CR30","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.entcs.2004.11.039","volume":"128","author":"C. Braghin","year":"2005","unstructured":"Braghin, C., Cortesi, A.: Flow-sensitive leakage analysis in mobile ambients. Electr. Notes Theor. Comput. Sci.\u00a0128(5), 17\u201325 (2005)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"issue":"1","key":"1_CR31","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/S0096-0551(02)00009-7","volume":"28","author":"C. Braghin","year":"2002","unstructured":"Braghin, C., Cortesi, A., Focardi, R.: Security boundaries in mobile ambients. Computer Languages, Systems & Structures\u00a028(1), 101\u2013127 (2002), http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0096055102000097","journal-title":"Computer Languages, Systems & Structures"},{"key":"1_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-642-21461-5_6","volume-title":"Formal Techniques for Distributed Systems","author":"M. Bravetti","year":"2011","unstructured":"Bravetti, M., Di Giusto, C., P\u00e9rez, J.A., Zavattaro, G.: Adaptable Processes (Extended Abstract). In: Bruni, R., Dingel, J. (eds.) FMOODS\/FORTE 2011. LNCS, vol.\u00a06722, pp. 90\u2013105. Springer, Heidelberg (2011)"},{"key":"1_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-540-27815-3_8","volume-title":"Algebraic Methodology and Software Technology","author":"A. Brogi","year":"2004","unstructured":"Brogi, A., Canal, C., Pimentel, E.: Behavioural Types and Component Adaptation. In: Rattray, C., Maharaj, S., Shankland, C. (eds.) AMAST 2004. LNCS, vol.\u00a03116, pp. 42\u201356. Springer, Heidelberg (2004)"},{"key":"1_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-01918-0_1","volume-title":"Formal Methods for Web Services","author":"R. Bruni","year":"2009","unstructured":"Bruni, R.: Calculi for Service-Oriented Computing. In: Bernardo, M., Padovani, L., Zavattaro, G. (eds.) SFM 2009. LNCS, vol.\u00a05569, pp. 1\u201341. Springer, Heidelberg (2009)"},{"key":"1_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/978-3-642-28872-2_17","volume-title":"Fundamental Approaches to Software Engineering","author":"R. Bruni","year":"2012","unstructured":"Bruni, R., Corradini, A., Gadducci, F., Lluch Lafuente, A., Vandin, A.: A Conceptual Framework for Adaptation. In: de Lara, J., Zisman, A. (eds.) FASE 2012. LNCS, vol.\u00a07212, pp. 240\u2013254. Springer, Heidelberg (2012)"},{"key":"1_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/978-3-540-68679-8_27","volume-title":"Concurrency, Graphs and Models","author":"D. Bucur","year":"2008","unstructured":"Bucur, D., Nielsen, M.: Secure Data Flow in a Calculus for Context Awareness. In: Degano, P., De Nicola, R., Meseguer, J. (eds.) Montanari Festschrift. LNCS, vol.\u00a05065, pp. 439\u2013456. Springer, Heidelberg (2008)"},{"key":"1_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/3-540-44685-0_8","volume-title":"CONCUR 2001 - Concurrency Theory","author":"M. Bugliesi","year":"2001","unstructured":"Bugliesi, M., Castagna, G., Crafa, S.: Reasoning about Security in Mobile Ambients. In: Larsen, K.G., Nielsen, M. (eds.) CONCUR 2001. LNCS, vol.\u00a02154, pp. 102\u2013120. Springer, Heidelberg (2001)"},{"key":"1_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-642-20401-2_8","volume-title":"Rigorous Software Engineering for Service-Oriented Systems","author":"L. Caires","year":"2011","unstructured":"Caires, L., De Nicola, R., Pugliese, R., Vasconcelos, V.T., Zavattaro, G.: Core Calculi for Service-Oriented Computing. In: Wirsing, M., H\u00f6lzl, M. (eds.) SENSORIA 2011. LNCS, vol.\u00a06582, pp. 153\u2013188. Springer, Heidelberg (2011)"},{"key":"1_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-36532-X_1","volume-title":"Software Security \u2013 Theories and Systems","author":"R. Campbell","year":"2003","unstructured":"Campbell, R., Al-Muhtadi, J., Naldurg, P., Sampemane, G., Mickunas, M.D.: Towards Security and Privacy for Pervasive Computing. In: Okada, M., Babu, C. S., Scedrov, A., Tokuda, H. (eds.) ISSS 2002. LNCS, vol.\u00a02609, pp. 1\u201315. Springer, Heidelberg (2003), http:\/\/dl.acm.org\/citation.cfm?id=1765533.1765535"},{"key":"1_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/978-3-540-71316-6_2","volume-title":"Programming Languages and Systems","author":"M. Carbone","year":"2007","unstructured":"Carbone, M., Honda, K., Yoshida, N.: Structured Communication-Centred Programming for Web Services. In: De Nicola, R. (ed.) ESOP 2007. LNCS, vol.\u00a04421, pp. 2\u201317. Springer, Heidelberg (2007)"},{"key":"1_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/BFb0053547","volume-title":"Foundations of Software Science and Computation Structures","author":"L. Cardelli","year":"1998","unstructured":"Cardelli, L., Gordon, A.D.: Mobile Ambients. In: Nivat, M. (ed.) FOSSACS 1998. LNCS, vol.\u00a01378, pp. 140\u2013155. Springer, Heidelberg (1998), http:\/\/dx.doi.org\/10.1007\/BFb0053547"},{"key":"1_CR42","unstructured":"Chen, G., Kotz, D.: A survey of context-aware mobile computing research. Tech. rep., Dartmouth College, Hanover, NH, USA (2000)"},{"issue":"03","key":"1_CR43","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1017\/S0269888904000025","volume":"18","author":"H. Chen","year":"2003","unstructured":"Chen, H., Finin, T., Joshi, A.: An ontology for context-aware pervasive computing environments. The Knowledge Engineering Review\u00a018(03), 197\u2013207 (2003)","journal-title":"The Knowledge Engineering Review"},{"key":"1_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-02161-9_1","volume-title":"Software Engineering for Self-Adaptive Systems","author":"B.H.C. Cheng","year":"2009","unstructured":"Cheng, B.H.C., de Lemos, R., Giese, H., Inverardi, P., Magee, J., Andersson, J., Becker, B., Bencomo, N., Brun, Y., Cukic, B., Di Marzo Serugendo, G., Dustdar, S., Finkelstein, A., Gacek, C., Geihs, K., Grassi, V., Karsai, G., Kienle, H.M., Kramer, J., Litoiu, M., Malek, S., Mirandola, R., M\u00fcller, H.A., Park, S., Shaw, M., Tichy, M., Tivoli, M., Weyns, D., Whittle, J.: Software Engineering for Self-Adaptive Systems: A Research Roadmap. In: Cheng, B.H.C., de Lemos, R., Giese, H., Inverardi, P., Magee, J. (eds.) Software Engineering for Self-Adaptive Systems. LNCS, vol.\u00a05525, pp. 1\u201326. Springer, Heidelberg (2009)"},{"key":"1_CR45","unstructured":"Chinnici, R., Gudgina, M., Moreau, J., Weerawarana, S.: Web Service Description Language (WSDL), Version 1.2 (2002)"},{"issue":"10","key":"1_CR46","doi-asserted-by":"publisher","first-page":"848","DOI":"10.1016\/j.scico.2010.02.009","volume":"75","author":"V. Ciancia","year":"2010","unstructured":"Ciancia, V., Ferrari, G.L., Guanciale, R., Strollo, D.: Event based choreography. Sci. Comput. Program.\u00a075(10), 848\u2013878 (2010)","journal-title":"Sci. Comput. Program."},{"key":"1_CR47","volume-title":"International Workshop on Context-Oriented Programming, COP 2009","author":"D. Clarke","year":"2009","unstructured":"Clarke, D., Costanza, P., Tanter, E.: How should context-escaping closures proceed? In: International Workshop on Context-Oriented Programming, COP 2009, pp. 1:1\u20131:6. ACM, New York (2009), http:\/\/doi.acm.org\/10.1145\/1562112.1562113"},{"key":"1_CR48","volume-title":"International Workshop on Context-Oriented Programming, COP 2009","author":"D. Clarke","year":"2009","unstructured":"Clarke, D., Sergey, I.: A semantics for context-oriented programming with layers. In: International Workshop on Context-Oriented Programming, COP 2009, pp. 10:1\u201310:6. ACM, New York (2009), http:\/\/doi.acm.org\/10.1145\/1562112.1562122"},{"key":"1_CR49","doi-asserted-by":"crossref","unstructured":"Costanza, P.: Language constructs for context-oriented programming. In: Proceedings of the Dynamic Languages Symposium, pp. 1\u201310. ACM Press (2005)","DOI":"10.1145\/1146841.1146842"},{"key":"1_CR50","doi-asserted-by":"crossref","unstructured":"Curbera, F., Khalaf, R., Mukhi, N., Tai, S., Weerawarane, S.: The next step in web services. Communications of the ACM\u00a046(10) (2003)","DOI":"10.1145\/944217.944234"},{"key":"1_CR51","unstructured":"De Nicola, R., Ferrari, G., Loreti, M., Pugliese, R.: A language-based approach to autonomic computing. In: FMCO 2011. LNCS. Springer (to appear, 2012)"},{"key":"1_CR52","doi-asserted-by":"crossref","unstructured":"Degano, P., Ferrari, G.L., Galletta, L., Mezzetti, G.: Typing context-dependent behavioural variations. In: PLACES 2012 (vol. to appear in EPTCS 2012)","DOI":"10.4204\/EPTCS.109.5"},{"key":"1_CR53","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-3-642-30829-1_18","volume-title":"Coordination Models and Languages","author":"P. Degano","year":"2012","unstructured":"Degano, P., Ferrari, G.-L., Galletta, L., Mezzetti, G.: Types for Coordinating Secure Behavioural Variations. In: Sirjani, M. (ed.) COORDINATION 2012. LNCS, vol.\u00a07274, pp. 261\u2013276. Springer, Heidelberg (2012)"},{"issue":"3","key":"1_CR54","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1108\/14684520910969880","volume":"33","author":"M. Deng","year":"2009","unstructured":"Deng, M., Cock, D.D., Preneel, B.: Towards a cross-context identity management framework in e-health. Online Information Review\u00a033(3), 422\u2013442 (2009)","journal-title":"Online Information Review"},{"issue":"2","key":"1_CR55","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s002360050074","volume":"34","author":"J. Esparza","year":"1997","unstructured":"Esparza, J.: Decidability of model checking for infinite-state concurrent systems. Acta Inf.\u00a034(2), 85\u2013107 (1997)","journal-title":"Acta Inf."},{"key":"1_CR56","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/11888116_4","volume-title":"Formal Techniques for Networked and Distributed Systems - FORTE 2006","author":"G. Ferrari","year":"2006","unstructured":"Ferrari, G., Guanciale, R., Strollo, D.: JSCL: A Middleware for Service Coordination. In: Najm, E., Pradat-Peyre, J.-F., Donzeau-Gouge, V.V. (eds.) FORTE 2006. LNCS, vol.\u00a04229, pp. 46\u201360. Springer, Heidelberg (2006)"},{"key":"1_CR57","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, pp. 169\u2013178. ACM (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"1_CR58","unstructured":"Greenfield, A.: Everyware: The dawning age of ubiquitous computing. Peachpit Press (2006)"},{"key":"1_CR59","unstructured":"Gu, T., Wang, X., Pung, H., Zhang, D.: An ontology-based context model in intelligent environments. In: Proceedings of Communication Networks and Distributed Systems Modeling and Simulation Conference, vol.\u00a02004, pp. 270\u2013275 (2004)"},{"key":"1_CR60","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/11948148_27","volume-title":"Service-Oriented Computing \u2013 ICSOC 2006","author":"C. Guidi","year":"2006","unstructured":"Guidi, C., Lucchi, R., Gorrieri, R., Busi, N., Zavattaro, G.: SOCK: A Calculus for Service Oriented Computing. In: Dan, A., Lamersdorf, W. (eds.) ICSOC 2006. LNCS, vol.\u00a04294, pp. 327\u2013338. Springer, Heidelberg (2006)"},{"issue":"1","key":"1_CR61","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1145\/1111596.1111601","volume":"28","author":"K.W. Hamlen","year":"2006","unstructured":"Hamlen, K.W., Morrisett, J.G., Schneider, F.B.: Computability classes for enforcement mechanisms. ACM Trans. on Programming Languages and Systems\u00a028(1), 175\u2013205 (2006)","journal-title":"ACM Trans. on Programming Languages and Systems"},{"key":"1_CR62","doi-asserted-by":"crossref","unstructured":"Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S., Kumar, S., Wehrle, K.: Security challenges in the ip-based internet of things. Wireless Personal Communications, 1\u201316 (2011)","DOI":"10.1007\/s11277-011-0385-5"},{"issue":"3","key":"1_CR63","doi-asserted-by":"publisher","first-page":"125","DOI":"10.5381\/jot.2008.7.3.a4","volume":"7","author":"R. Hirschfeld","year":"2008","unstructured":"Hirschfeld, R., Costanza, P., Nierstrasz, O.: Context-oriented programming. Journal of Object Technology\u00a07(3), 125\u2013151 (2008)","journal-title":"Journal of Object Technology"},{"key":"1_CR64","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/1960510.1960515","volume-title":"Proceedings of the 10th International Workshop on Foundations of Aspect-oriented Languages, FOAL 2011","author":"R. Hirschfeld","year":"2011","unstructured":"Hirschfeld, R., Igarashi, A., Masuhara, H.: ContextFJ: a minimal core calculus for context-oriented programming. In: Proceedings of the 10th International Workshop on Foundations of Aspect-oriented Languages, FOAL 2011, pp. 19\u201323. ACM, New York (2011), http:\/\/doi.acm.org\/10.1145\/1960510.1960515"},{"key":"1_CR65","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/BFb0053567","volume-title":"Programming Languages and Systems","author":"K. Honda","year":"1998","unstructured":"Honda, K., Vasconcelos, V.T., Kubo, M.: Language Primitives and Type Discipline for Structured Communication-Based Programming. In: Hankin, C. (ed.) ESOP 1998. LNCS, vol.\u00a01381, pp. 122\u2013138. Springer, Heidelberg (1998)"},{"key":"1_CR66","doi-asserted-by":"crossref","unstructured":"Hulsebosch, R., Salden, A., Bargh, M., Ebben, P., Reitsma, J.: Context sensitive access control. In: Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, pp. 111\u2013119. ACM (2005)","DOI":"10.1145\/1063979.1064000"},{"key":"1_CR67","unstructured":"IBM: An architectural blueprint for autonomic computing. Tech. rep. (2005)"},{"issue":"3","key":"1_CR68","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1145\/503502.503505","volume":"23","author":"A. Igarashi","year":"2001","unstructured":"Igarashi, A., Pierce, B.C., Wadler, P.: Featherweight java: a minimal core calculus for Java and GJ. ACM Trans. Program. Lang. Syst.\u00a023(3), 396\u2013450 (2001)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"1_CR69","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1145\/1960275.1960305","volume-title":"Proceedings of the Tenth International Conference on Aspect-oriented Software Development, AOSD 2011","author":"T. Kamina","year":"2011","unstructured":"Kamina, T., Aotani, T., Masuhara, H.: Eventcj: a context-oriented programming language with declarative event-based context transition. In: Proceedings of the Tenth International Conference on Aspect-oriented Software Development, AOSD 2011, pp. 253\u2013264. ACM, New York (2011), http:\/\/doi.acm.org\/10.1145\/1960275.1960305"},{"key":"1_CR70","unstructured":"Kavantza, N., et al.: Web Service Coreography Description Language, http:\/\/www.w3.org\/TR\/ws-cdl-10\/"},{"key":"1_CR71","unstructured":"Kelly, L.: The security threats of technology ubiquity, http:\/\/www.computerweekly.com\/feature\/The-security-threats-of-technology-ubiquity"},{"key":"1_CR72","unstructured":"Khalaf, R., Mukhi, N., Weerawarana, S.: Service oriented composition in BPEL4WS. In: Proc. WWW (2003)"},{"key":"1_CR73","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-540-71316-6_4","volume-title":"Programming Languages and Systems","author":"A. Lapadula","year":"2007","unstructured":"Lapadula, A., Pugliese, R., Tiezzi, F.: A Calculus for Orchestration of Web Services. In: De Nicola, R. (ed.) ESOP 2007. LNCS, vol.\u00a04421, pp. 33\u201347. Springer, Heidelberg (2007)"},{"key":"1_CR74","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"782","DOI":"10.1007\/11564751_64","volume-title":"Principles and Practice of Constraint Programming - CP 2005","author":"A. Lazovik","year":"2005","unstructured":"Lazovik, A., Aiello, M., Gennari, R.: Encoding Requests to Web Service Compositions as Constraints. In: van Beek, P. (ed.) CP 2005. LNCS, vol.\u00a03709, pp. 782\u2013786. Springer, Heidelberg (2005)"},{"issue":"1","key":"1_CR75","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/596980.596981","volume":"25","author":"F. Levi","year":"2003","unstructured":"Levi, F., Sangiorgi, D.: Mobile safe ambients. ACM Trans. Program. Lang. Syst.\u00a025(1), 1\u201369 (2003)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"1_CR76","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1007\/978-3-642-28166-2_7","volume-title":"ESSoS 2012","author":"M. Masi","year":"2012","unstructured":"Masi, M., Pugliese, R., Tiezzi, F.: Formalisation and Implementation of the XACML Access Control Mechanism. In: Barthe, G., Livshits, B., Scandariato, R. (eds.) ESSoS 2012. LNCS, vol.\u00a07159, pp. 60\u201374. Springer, Heidelberg (2012)"},{"key":"1_CR77","doi-asserted-by":"crossref","unstructured":"Misra, J.: A programming model for the orchestration of web services. In: 2nd International Conference on Software Engineering and Formal Methods, SEFM 2004 (2004)","DOI":"10.1109\/SEFM.2004.1347498"},{"key":"1_CR78","doi-asserted-by":"crossref","unstructured":"Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, pp. 113\u2013124. ACM (2011)","DOI":"10.1145\/2046660.2046682"},{"key":"1_CR79","unstructured":"Papazoglou, M.P.: Service-oriented computing: Concepts, characteristics and directions. In: WISE (2003)"},{"issue":"2","key":"1_CR80","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1142\/S0218843008001816","volume":"17","author":"M.P. Papazoglou","year":"2008","unstructured":"Papazoglou, M.P., Traverso, P., Dustdar, S., Leymann, F.: Service-oriented computing: a research roadmap. Int. J. Cooperative Inf. Syst.\u00a017(2), 223\u2013255 (2008)","journal-title":"Int. J. Cooperative Inf. Syst."},{"key":"1_CR81","doi-asserted-by":"crossref","unstructured":"Papazouglou, M., Georgakopoulos, D.: Special issue on service oriented computing. Communications of the ACM\u00a046(10) (2003)","DOI":"10.1145\/944217.944233"},{"issue":"11","key":"1_CR82","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1109\/MCOM.2006.248176","volume":"44","author":"L. Pelusi","year":"2006","unstructured":"Pelusi, L., Passarella, A., Conti, M.: Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE Communications Magazine\u00a044(11), 134\u2013141 (2006)","journal-title":"IEEE Communications Magazine"},{"key":"1_CR83","unstructured":"Pfleeger, C., Pfleeger, S.: Security in computing. Prentice Hall (2003)"},{"issue":"4","key":"1_CR84","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/643550.643558","volume":"6","author":"M. Rom\u00e1n","year":"2002","unstructured":"Rom\u00e1n, M., Hess, C., Cerqueira, R., Ranganathan, A., Campbell, R., Nahrstedt, K.: Gaia: a middleware platform for active spaces. ACM SIGMOBILE Mobile Computing and Communications Review\u00a06(4), 65\u201367 (2002)","journal-title":"ACM SIGMOBILE Mobile Computing and Communications Review"},{"key":"1_CR85","unstructured":"Sangiorgi, D., Walker, D.: The Pi-Calculus - a theory of mobile processes. Cambridge University Press (2001)"},{"key":"1_CR86","doi-asserted-by":"crossref","unstructured":"Schilit, B., Adams, N., Want, R.: Context-aware computing applications. In: Proceedings of the Workshop on Mobile Computing Systems and Applications, pp. 85\u201390. IEEE Computer Society (1994)","DOI":"10.1109\/WMCSA.1994.16"},{"issue":"2","key":"1_CR87","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1017\/S0956796807006466","volume":"18","author":"C. Skalka","year":"2008","unstructured":"Skalka, C., Smith, S., Horn, D.V.: Types and trace effects of higher order programs. Journal of Functional Programming\u00a018(2), 179\u2013249 (2008)","journal-title":"Journal of Functional Programming"},{"key":"1_CR88","doi-asserted-by":"crossref","unstructured":"Stal, M.: Web services: Beyond component-based computing. Communications of the ACM\u00a055(10) (2002)","DOI":"10.1145\/570907.570934"},{"issue":"5","key":"1_CR89","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L., et al.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty Fuzziness and Knowledge Based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"International Journal of Uncertainty Fuzziness and Knowledge Based Systems"},{"issue":"6","key":"1_CR90","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2010.186","volume":"8","author":"H. Takabi","year":"2010","unstructured":"Takabi, H., Joshi, J.B.D., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Security & Privacy\u00a08(6), 24\u201331 (2010)","journal-title":"IEEE Security & Privacy"},{"key":"1_CR91","unstructured":"Vallecillo, A., Vansconcelos, V., Ravara, A.: Typing the behaviours of objects and components using session types. In: Proc. of FOCLASA (2002)"},{"key":"1_CR92","unstructured":"Vardi, M.Y., Wolper, P.: An automata-theoretic approach to automatic program verification (preliminary report). In: LICS, pp. 332\u2013344. IEEE Computer Society (1986)"},{"key":"1_CR93","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-47959-7_3","volume-title":"Internet Programming Languages","author":"J. Vitek","year":"1999","unstructured":"Vitek, J., Castagna, G.: Seal: A Framework for Secure Mobile Computations. In: Bal, H.E., Belkhouche, B., Cardelli, L. (eds.) ICCL 1998 Workshop. LNCS, vol.\u00a01686, pp. 47\u201377. Springer, Heidelberg (1999)"},{"key":"1_CR94","doi-asserted-by":"crossref","unstructured":"Vogels, W.: Web services are not distributed objects. IEEE Internet Computing\u00a07(6) (2003)","DOI":"10.1109\/MIC.2003.1250585"},{"key":"1_CR95","unstructured":"Wang, X.H., Zhang, D.Q., Gu, T., Pung, H.K.: Ontology based context modeling and reasoning using owl. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 18\u201322. IEEE (2004)"},{"issue":"1","key":"1_CR96","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.clsr.2009.11.008","volume":"26","author":"R.H. Weber","year":"2010","unstructured":"Weber, R.H.: Internet of things-new security and privacy challenges. Computer Law & Security Review\u00a026(1), 23\u201330 (2010)","journal-title":"Computer Law & Security Review"},{"key":"1_CR97","series-title":"Lecture Notes in Computer Science","volume-title":"Rigorous Software Engineering for Service-Oriented Systems","year":"2011","unstructured":"Wirsing, M., H\u00f6lzl, M.M. (eds.): SENSORIA. LNCS, vol.\u00a06582. Springer, Heidelberg (2011)"},{"key":"1_CR98","unstructured":"Wrona, K., Gomez, L.: Context-aware security and secure context-awareness in ubiquitous computing environments. In: XXI Autumn Meeting of Polish Information Processing Society (2005)"},{"key":"1_CR99","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/978-3-642-28641-4_15","volume-title":"Principles of Security and Trust","author":"M. Yang","year":"2012","unstructured":"Yang, M., Sassone, V., Hamadou, S.: A Game-Theoretic Analysis of Cooperation in Anonymity Networks. In: Degano, P., Guttman, J.D. (eds.)POST 2012. LNCS, vol.\u00a07215, pp. 269\u2013289. Springer, Heidelberg (2012)"},{"key":"1_CR100","doi-asserted-by":"crossref","unstructured":"Zhang, G., Parashar, M.: Dynamic context-aware access control for grid applications. In: Proceedings of the Fourth International Workshop on Grid Computing, pp. 101\u2013108. IEEE (2003)","DOI":"10.1109\/GRID.2003.1261704"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33260-9_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T02:23:37Z","timestamp":1744165417000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33260-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642332593","9783642332609"],"references-count":100,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33260-9_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}