{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:00:41Z","timestamp":1725703241404},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642339790"},{"type":"electronic","value":"9783642339806"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33980-6_52","type":"book-chapter","created":{"date-parts":[[2012,9,26]],"date-time":"2012-09-26T18:33:08Z","timestamp":1348684388000},"page":"480-487","source":"Crossref","is-referenced-by-count":0,"title":["Securing Collaborative Business Processes: A Methodology for Security Management in Service-Based Infrastructure"],"prefix":"10.1007","author":[{"given":"Pascal","family":"Bou Nassar","sequence":"first","affiliation":[]},{"given":"Youakim","family":"Badr","sequence":"additional","affiliation":[]},{"given":"Fr\u00e9d\u00e9rique","family":"Biennier","sequence":"additional","affiliation":[]},{"given":"Kablan","family":"Barbar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"52_CR1","doi-asserted-by":"crossref","unstructured":"Badr, Y., Biennier, F., Tata, S.: The Integration of Corporate Security Strategies in Collaborative Business Processes. Transactions on Services Computing (2010)","DOI":"10.1109\/TSC.2010.18"},{"key":"52_CR2","unstructured":"The Open Group, SOA white paper, \n                    \n                      https:\/\/www2.opengroup.org"},{"key":"52_CR3","doi-asserted-by":"crossref","unstructured":"Chaari, S., Badr, Y., Biennier, F.: Enhancing web service selection by QoS-based ontology and WS-policy. In: Proceedings of the 2008 ACM Symposium on Applied Computing, pp. 2426\u20132431 (2008)","DOI":"10.1145\/1363686.1364260"},{"issue":"4","key":"52_CR4","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1504\/IJWET.2006.010423","volume":"2","author":"M.P. Papazoglou","year":"2006","unstructured":"Papazoglou, M.P., Van Den Heuvel, W.J.: Service-oriented design and development methodology. International Journal of Web Engineering and Technology\u00a02(4), 412\u2013442 (2006)","journal-title":"International Journal of Web Engineering and Technology"},{"issue":"3","key":"52_CR5","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1147\/sj.473.0377","volume":"47","author":"A. Arsanjani","year":"2008","unstructured":"Arsanjani, A., Ghosh, S., Allam, A., Abdollah, T., Gariapathy, S., Holley, K.: SOMA: a method for developing service-oriented solutions. IBM Syst. J.\u00a047(3), 377\u2013396 (2008)","journal-title":"IBM Syst. J."},{"key":"52_CR6","unstructured":"Emig, C., Krutz, K., Link, S., Momm, C., Abeck, S.: Model-driven development of SOA services. Cooperation & Management, Universit\u00e4t Karlsruhe (TH), Internal Research Report (2008)"},{"key":"52_CR7","unstructured":"Bate, C., Mulholland, A., Capgemini, U.K.: A methodology for service architectures (2005)"},{"key":"52_CR8","unstructured":"Zimmermann, O., Schlimm, N., Waller, G., Pestel, M.: Analysis and design tech-niques for Service-Oriented Development and Integration. IBM Deutschland (2005)"},{"key":"52_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1007\/978-3-540-73597-7_55","volume-title":"Web Engineering","author":"N. Kokash","year":"2007","unstructured":"Kokash, N.: Risk Management for Service-Oriented Systems. In: Baresi, L., Fraternali, P., Houben, G.-J. (eds.) ICWE 2007. LNCS, vol.\u00a04607, pp. 563\u2013568. Springer, Heidelberg (2007)"},{"key":"52_CR10","doi-asserted-by":"crossref","unstructured":"Nassar, P.B., Badr, Y., Barbar, K., Biennier, F.: Risk management and security in service-based architectures. In: International Conference on Advances in Computational Tools for Engineering Applications, ACTEA 2009, pp. 214\u2013218 (2009)","DOI":"10.1109\/ACTEA.2009.5227927"},{"key":"52_CR11","volume-title":"Model-driven risk analysis: the CORAS approach","author":"M. Lund","year":"2010","unstructured":"Lund, M.: Model-driven risk analysis: the CORAS approach. Springer, Berlin (2010)"},{"key":"52_CR12","unstructured":"Parigot, D., Boussemart, B., et al.: Architecture Orient\u00e9 Service Dynamique: D-SOA (2008)"}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Production Management Systems. Value Networks: Innovation, Technologies, and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33980-6_52.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:28:20Z","timestamp":1620131300000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33980-6_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642339790","9783642339806"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33980-6_52","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2012]]}}}