{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:00:44Z","timestamp":1725703244966},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642339790"},{"type":"electronic","value":"9783642339806"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33980-6_39","type":"book-chapter","created":{"date-parts":[[2012,9,26]],"date-time":"2012-09-26T18:33:08Z","timestamp":1348684388000},"page":"350-358","source":"Crossref","is-referenced-by-count":1,"title":["Toward Comprehensive Security Policy Governance in Collaborative Enterprise"],"prefix":"10.1007","author":[{"given":"Ziyi","family":"Su","sequence":"first","affiliation":[]},{"given":"Fr\u00e9d\u00e9rique","family":"Biennier","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Linda, B.B., Richard, C., Kristin, L., Ric, T., Mark, E.: The evolving role of IT managers and CIOs\u2013findings from the 2010 IBM global IT risk study. Technical report, IBM (2010)","key":"39_CR1"},{"unstructured":"Jay, H., Mark, N.: Assessing the security risks of Cloud Computing. Technical report, Gartner (2008)","key":"39_CR2"},{"key":"39_CR3","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/978-3-642-15961-9_50","volume-title":"Collaborative Networks for a Sustainable World","author":"F. Biennier","year":"2010","unstructured":"Biennier, F., Aubry, R., Maranzana, M.: Integration of Business and Industrial Knowledge on Services to Set Trusted Business Communities of Organisations. In: Camarinha-Matos, L.M., Boucher, X., Afsarmanesh, H. (eds.) PRO-VE 2010. IFIP AICT, vol.\u00a0336, pp. 420\u2013426. Springer, Heidelberg (2010)"},{"doi-asserted-by":"crossref","unstructured":"Su, Z., Biennier, F.: End-to-end Security Policy Description and Management for Collaborative System. In: Proc. IAS 2010, pp. 68\u201373 (2010)","key":"39_CR4","DOI":"10.1109\/ISIAS.2010.5604183"},{"doi-asserted-by":"crossref","unstructured":"Su, Z., Biennier, F.: End-to-end security policy description and management for collaborative system. In: Proc. IAS 2010, pp. 137\u2013142. MIR Lab. (August 2010)","key":"39_CR5","DOI":"10.1109\/ISIAS.2010.5604183"},{"key":"39_CR6","doi-asserted-by":"publisher","first-page":"20","DOI":"10.4018\/jwsr.2008070102","volume":"5","author":"F. Paci","year":"2008","unstructured":"Paci, F., Bertino, E., Crampton, J.: An Access-Control Framework for WS-BPEL. Int. J. Web Service Res.\u00a05, 20\u201343 (2008)","journal-title":"Int. J. Web Service Res."},{"key":"39_CR7","doi-asserted-by":"publisher","first-page":"48","DOI":"10.4018\/jwsr.2009071303","volume":"6","author":"L. Martino","year":"2009","unstructured":"Martino, L., Bertino, E.: Security for Web Services: Standards and Resarch Issues. Int. J. Web Service Res.\u00a06, 48\u201374 (2009)","journal-title":"Int. J. Web Service Res."},{"key":"39_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-540-77505-8_5","volume-title":"Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues","author":"T. Sans","year":"2008","unstructured":"Sans, T., Cuppens, F., Cuppens-Boulahia, N.: FORM: A Federated Rights Expression Model for Open DRM Frameworks. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, vol.\u00a04435, pp. 45\u201359. Springer, Heidelberg (2008)"},{"key":"39_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/11961635_7","volume-title":"Information Systems Security","author":"F. Cuppens","year":"2006","unstructured":"Cuppens, F., Cuppens-Boulahia, N., Coma, C.: O2O: Virtual Private Organizations to Manage Security Policy Interoperability. In: Bagchi, A., Atluri, V. (eds.) ICISS 2006. LNCS, vol.\u00a04332, pp. 101\u2013115. Springer, Heidelberg (2006)"},{"key":"39_CR10","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s10207-007-0051-9","volume":"7","author":"F. Cuppens","year":"2008","unstructured":"Cuppens, F., Cuppens-Boulahis, N.: Modeling Contextual Security Policies. Int. J.Inf. Secur.\u00a07, 285\u2013305 (2008)","journal-title":"Int. J.Inf. Secur."},{"key":"39_CR11","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/1029133.1029140","volume-title":"Proc. FMSE 2004","author":"L. Wang","year":"2004","unstructured":"Wang, L., Wijesekera, D., Jajodia, S.: A logic-based Framework for Attribute Based Access Control. In: Proc. FMSE 2004, pp. 45\u201355. ACM, New York (2004)"},{"unstructured":"Organization for the Advancement of Structured Information Standards (OASIS): eXtensible Access Control Markup Language (XACML) version 2.0. OASIS (2005)","key":"39_CR12"},{"key":"39_CR13","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s10207-007-0045-7","volume":"7","author":"J.G. Alfaro","year":"2008","unstructured":"Alfaro, J.G., Cuppens-Boulahia, N., Cuppens, F.: Complete Analysis of Configuration Rules to Guarantee Reliable Network Security Policies. Int. J.Inf. Secur.\u00a07, 103\u2013122 (2008)","journal-title":"Int. J.Inf. Secur."},{"key":"39_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-642-02918-9_11","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"N. Kheir","year":"2009","unstructured":"Kheir, N., Debar, H., Cuppens, F., Cuppens-Boulahia, N., Viinikka, J.: A Service Dependency Modeling Framework for Policy-Based Response Enforcement. In: Flegel, U., Bruschi, D. (eds.) DIMVA 2009. LNCS, vol.\u00a05587, pp. 176\u2013195. Springer, Heidelberg (2009)"},{"key":"39_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-14706-7_1","volume-title":"Computer Network Security","author":"H. Debar","year":"2010","unstructured":"Debar, H., Kheir, N., Cuppens-Boulahia, N., Cuppens, F.: Service Dependencies in Information Systems Security. In: Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2010. LNCS, vol.\u00a06258, pp. 1\u201320. Springer, Heidelberg (2010)"}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Production Management Systems. Value Networks: Innovation, Technologies, and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33980-6_39.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:28:14Z","timestamp":1620131294000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33980-6_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642339790","9783642339806"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33980-6_39","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2012]]}}}