{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T03:40:06Z","timestamp":1746416406733,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662453902"},{"type":"electronic","value":"9783662453919"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-45391-9_48","type":"book-chapter","created":{"date-parts":[[2014,10,10]],"date-time":"2014-10-10T04:01:44Z","timestamp":1412913704000},"page":"551-559","source":"Crossref","is-referenced-by-count":5,"title":["Designing Secure Service Workflows in BPEL"],"prefix":"10.1007","author":[{"given":"Luca","family":"Pino","sequence":"first","affiliation":[]},{"given":"Khaled","family":"Mahbub","sequence":"additional","affiliation":[]},{"given":"George","family":"Spanoudakis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"48_CR1","unstructured":"Pawar, P., Tokmakoff, A.: Ontology-Based Context-Aware Service Discovery for Pervasive Environments. In: 1st IEEE International Workshop on Services Integration in Pervasive Environments (SIPE 2006), in conjunction with IEEE ICPS 2006 (2006)"},{"key":"48_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1007\/11948148_46","volume-title":"Service-Oriented Computing \u2013 ICSOC 2006","author":"R. Mikhaiel","year":"2006","unstructured":"Mikhaiel, R., Stroulia, E.: Examining usage protocols for service discovery. In: Dan, A., Lamersdorf, W. (eds.) ICSOC 2006. LNCS, vol.\u00a04294, pp. 496\u2013502. Springer, Heidelberg (2006)"},{"issue":"3","key":"48_CR3","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1109\/TSE.2009.88","volume":"36","author":"G. Spanoudakis","year":"2010","unstructured":"Spanoudakis, G., Zisman, A.: Discovering Services During Service Based Systems Design Using UML. IEEE Trans. on Software Eng.\u00a036(3), 371\u2013389 (2010)","journal-title":"IEEE Trans. on Software Eng."},{"issue":"12","key":"48_CR4","doi-asserted-by":"publisher","first-page":"2361","DOI":"10.1109\/JSAC.2005.857202","volume":"23","author":"K. Fujii","year":"2005","unstructured":"Fujii, K., Suda, T.: Semantics-Based Dynamic Web Service Composition. IEEE Journal on Selected Areas in Communications\u00a023(12), 2361\u20132372 (2005)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"48_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1007\/978-3-642-16132-2_50","volume-title":"Service-Oriented Computing. ICSOC\/ServiceWave 2009 Workshops","author":"E. Silva","year":"2010","unstructured":"Silva, E., Pires, L.F., van Sinderen, M.: On the Support of Dynamic Service Composition at Runtime. In: Dan, A., Gittler, F., Toumani, F. (eds.) ICSOC\/ServiceWave 2009. LNCS, vol.\u00a06275, pp. 530\u2013539. Springer, Heidelberg (2010)"},{"key":"48_CR6","doi-asserted-by":"crossref","unstructured":"Pino, L., Spanoudakis, G.: Constructing Secure Service Compositions with Patterns. In: IEEE SERVICES 2012, pp. 184\u2013191. IEEE Press (2012)","DOI":"10.1109\/SERVICES.2012.61"},{"key":"48_CR7","unstructured":"BPEL Designer Project, http:\/\/www.eclipse.org\/bpel\/"},{"key":"48_CR8","unstructured":"ASSERT4SOA Consortium: ASSERTs Aware Service Based Systems Adaptation. ASSERT4SOA Project, Deliverable D2.3 (2012)"},{"key":"48_CR9","unstructured":"Drools \u2013 Jboss Community, http:\/\/drools.jboss.org"},{"key":"48_CR10","doi-asserted-by":"crossref","unstructured":"Aggarwal, R., Verma, K., et al.: Constraint Driven Web Service Composition in METEOR-S. In: IEEE SCC 2004, pp. 23\u201330. IEEE Press (2004)","DOI":"10.1109\/SCC.2004.1357986"},{"key":"48_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/978-3-642-10383-4_27","volume-title":"Service-Oriented Computing","author":"A.R.R. Souza","year":"2009","unstructured":"Souza, A.R.R., et al.: Incorporating Security Requirements into Service Composition: From Modelling to Execution. In: Baresi, L., Chi, C.-H., Suzuki, J. (eds.) ICSOC-ServiceWave 2009. LNCS, vol.\u00a05900, pp. 373\u2013388. Springer, Heidelberg (2009)"},{"key":"48_CR12","doi-asserted-by":"crossref","unstructured":"Charfi, A., Mezini, M.: Using aspects for security engineering of web service compositions. In: IEEE ICWS 2005, pp. 59\u201366. IEEE Press (2005)","DOI":"10.1109\/ICWS.2005.126"},{"issue":"5","key":"48_CR13","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1108\/10662240610710978","volume":"16","author":"M. Hafner","year":"2006","unstructured":"Hafner, M., Breu, R., et al.: Sectet: An extensible framework for the realization of secure inter-organizational workflows. Internet Research\u00a016(5), 491\u2013506 (2006)","journal-title":"Internet Research"},{"issue":"1","key":"48_CR14","first-page":"57","volume":"38","author":"C. Guti\u00e9rrez","year":"2006","unstructured":"Guti\u00e9rrez, C., Fern\u00e1ndez-Medina, E., Piattini, M.: Towards a process for web services security. J. of Research and Practice in Information Technology\u00a038(1), 57\u201368 (2006)","journal-title":"J. of Research and Practice in Information Technology"},{"issue":"1","key":"48_CR15","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/TSE.2007.70740","volume":"34","author":"M. Bartoletti","year":"2008","unstructured":"Bartoletti, M., Degano, P., et al.: Semantics-based design for secure web services. IEEE Trans. on Software Eng.\u00a034(1), 33\u201349 (2008)","journal-title":"IEEE Trans. on Software Eng."},{"key":"48_CR16","first-page":"115","volume-title":"ICSOC 2004","author":"M. Deubler","year":"2004","unstructured":"Deubler, M., Gr\u00fcnbauer, J., J\u00fcrjens, J., Wimmel, G.: Sound development of secure service-based systems. In: ICSOC 2004, pp. 115\u2013124. ACM, New York (2004)"},{"issue":"3","key":"48_CR17","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1109\/TSE.2010.36","volume":"36","author":"G. Georg","year":"2010","unstructured":"Georg, G., Anastasakis, K., et al.: Verification and trade-off analysis of security properties in UML system models. IEEE Trans. on Software Eng.\u00a036(3), 338\u2013356 (2010)","journal-title":"IEEE Trans. on Software Eng."},{"key":"48_CR18","doi-asserted-by":"crossref","unstructured":"Menzel, M., Warschofsky, R., Meinel, C.: A pattern-driven generation of security policies for service-oriented architectures. In: IEEE ICWS 2010, pp. 243\u2013250. IEEE Press (2010)","DOI":"10.1109\/ICWS.2010.25"},{"key":"48_CR19","doi-asserted-by":"crossref","unstructured":"S\u00e9guran, M., H\u00e9bert, C., Frankova, G.: Secure workflow development from early requirements analysis. In: IEEE ECOWS 2008, pp. 125\u2013134. IEEE Press (2008)","DOI":"10.1109\/ECOWS.2008.13"},{"key":"48_CR20","doi-asserted-by":"crossref","unstructured":"McLean, J.: A general theory of composition for trace sets closed under selective interleaving functions. In: 1994 IEEE Symp. on Sec. and Privacy, pp. 79\u201393. IEEE CS Press (1994)","DOI":"10.1109\/RISP.1994.296590"},{"key":"48_CR21","doi-asserted-by":"crossref","unstructured":"Mantel, H.: On the composition of secure systems. In: 2002 IEEE Symp. on Sec. and Privacy, pp. 88\u2013101. IEEE CS Press (2002)","DOI":"10.1109\/SECPRI.2002.1004364"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-45391-9_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T02:58:42Z","timestamp":1746413922000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-45391-9_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662453902","9783662453919"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-45391-9_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}