{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:24:24Z","timestamp":1725459864208},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642362842"},{"type":"electronic","value":"9783642362859"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36285-9_71","type":"book-chapter","created":{"date-parts":[[2013,1,24]],"date-time":"2013-01-24T03:26:30Z","timestamp":1358997990000},"page":"713-718","source":"Crossref","is-referenced-by-count":0,"title":["Advanced Protection of Workflow Sessions with SEWebSession"],"prefix":"10.1007","author":[{"given":"Maxime","family":"Fonda","sequence":"first","affiliation":[]},{"given":"St\u00e9phane","family":"Moinard","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Toinard","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"32","key":"71_CR1","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1016\/j.is.2005.11.008","volume":"3","author":"J. Wainer","year":"2007","unstructured":"Wainer, J., Kumar, A., Barthelmess, P.: DW-RBAC: A formal security model of delegation and revocation in workflow systems. Inf. Syst.\u00a03(32), 365\u2013384 (2007)","journal-title":"Inf. Syst."},{"key":"71_CR2","doi-asserted-by":"crossref","unstructured":"Adida, B.: Sessionlock: securing web sessions against eavesdropping. In: Proceedings of the 17th International Conference on World Wide Web, pp. 517\u2013524. ACM (2008)","DOI":"10.1145\/1367497.1367568"},{"key":"71_CR3","unstructured":"Anderson, J.: Computer Security Technology Planning Study, ESD-TR-73-51, Section 4.1.1, US Air Force Electronic Systems Division (1973), \n                    \n                      http:\/\/csrc.nist.gov\/publications\/history\/ande72.pdf"},{"key":"71_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/3-540-36388-2_6","volume-title":"Practical Aspects of Declarative Languages","author":"N. Li","year":"2002","unstructured":"Li, N., Mitchell, J.C.: DATALOG with Constraints: A Foundation for Trust Management Languages. In: Dahl, V. (ed.) PADL 2003. LNCS, vol.\u00a02562, pp. 58\u201373. Springer, Heidelberg (2002)"},{"key":"71_CR5","doi-asserted-by":"crossref","unstructured":"Finin, T., Joshi, A., Kagal, L., Niu, J., Sandhu, R., Winsborough, W.H., Thuraisingham, B.: ROWLBAC - Representing Role Based Access Control in OWL. In: Proceedings of 13th Symposium on Access Control Models and Technologies, pp. 58\u201373. ACM Press (2008)","DOI":"10.1145\/1377836.1377849"},{"issue":"8","key":"71_CR6","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"M.A. Harrison","year":"1976","unstructured":"Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in operating systems. Communications of the ACM\u00a019(8), 461\u2013471 (1976)","journal-title":"Communications of the ACM"},{"key":"71_CR7","volume-title":"2001 USENIX Annual Technical Conference (FREENIX 2001)","author":"P. Loscocco","year":"2001","unstructured":"Loscocco, P., Smalley, S.: Integrating flexible support for security policies into the linux operating system. In: 2001 USENIX Annual Technical Conference (FREENIX 2001). USENIX Association, Boston (2001)"},{"key":"71_CR8","first-page":"163","volume-title":"Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010","author":"B. Hicks","year":"2010","unstructured":"Hicks, B., Rueda, S., King, D., Moyer, T., Schiffman, J., Sreenivasan, Y., McDaniel, P., Jaeger, T.: An architecture for enforcing end-to-end access control over web applications. In: Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010, pp. 163\u2013172. ACM, New York (2010)"},{"key":"71_CR9","unstructured":"Wu, Y., Offutt, Y.: Modeling and testing web-based applications, Technical Report, Department of Information and Software Engineering, George Mason University, Fairfax, VA (2009)"},{"key":"71_CR10","unstructured":"Fard, R.E., Nezhad, R.K.: Dynamic Workflow Management Based On Policy-Enabled Authorization. Journal of Information Technology Management\u00a0XX(4), 57\u201368 (2009)"},{"key":"71_CR11","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1145\/1390630.1390661","volume-title":"Proceedings of the 2008 International Symposium on Software Testing and Analysis, ISSTA 2008","author":"G. Wassermann","year":"2008","unstructured":"Wassermann, G., Yu, D., Chander, A., Dhurjati, D., Inamura, H., Su, Z.: Dynamic test input generation for web applications. In: Proceedings of the 2008 International Symposium on Software Testing and Analysis, ISSTA 2008, Seattle, WA, USA, pp. 249\u2013260. ACM, New York (2008)"},{"key":"71_CR12","doi-asserted-by":"crossref","unstructured":"Afoulki, Z., Bousquet, A., Briffaut, J., Rouzaud-Cornabas, J., Toinard, C.: MAC Protection of the OpenNebula Cloud Environment. In: Proceeding of the Second International Workshop on Security and Performance in Cloud Computing, SPCLOUD 2012, Madrid, Spain (to appear, June 2012)","DOI":"10.1109\/HPCSim.2012.6266895"},{"issue":"3","key":"71_CR13","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1109\/TSC.2010.37","volume":"4","author":"L. Lowis","year":"2011","unstructured":"Lowis, L., Accorsi, R.: Vulnerability Analysis in SOA-Based Business Processes. IEEE T. Services Computing\u00a04(3), 230\u2013242 (2011)","journal-title":"IEEE T. Services Computing"}],"container-title":["Lecture Notes in Business Information Processing","Business Process Management Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36285-9_71","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T17:41:31Z","timestamp":1557510091000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36285-9_71"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642362842","9783642362859"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36285-9_71","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2013]]}}}