{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T04:24:29Z","timestamp":1743740669453,"version":"3.40.3"},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2012,6,1]],"date-time":"2012-06-01T00:00:00Z","timestamp":1338508800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["New Gener. Comput."],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1007\/s00354-012-0206-8","type":"journal-article","created":{"date-parts":[[2012,7,10]],"date-time":"2012-07-10T17:49:59Z","timestamp":1341942599000},"page":"215-240","source":"Crossref","is-referenced-by-count":1,"title":["Security Policy Conflicts in Service-oriented Systems"],"prefix":"10.1007","volume":"30","author":[{"given":"Bartosz","family":"Brodecki","sequence":"first","affiliation":[]},{"given":"Micha\u0142","family":"Szychowiak","sequence":"additional","affiliation":[]},{"given":"Piotr","family":"Sasak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,7,11]]},"reference":[{"key":"206_CR1","unstructured":"Laskey, K., McCabe, F., Brown, P., MacKenzie, M. and Metz, R., \u201cReference model for Service Oriented Architecture,\u201d OASIS Committee Draft 1.0, OASIS Open, 2006."},{"key":"206_CR2","doi-asserted-by":"crossref","unstructured":"Lupu, E. and Sloman, M., \u201cConflicts in policy-based distributed systems management,\u201d IEEE Transactions on Software Engineering, 25, pp. 852\u2013869, September 1999.","DOI":"10.1109\/32.824414"},{"key":"206_CR3","doi-asserted-by":"crossref","unstructured":"Brodecki, B. and Sasak, P. and Szychowiak, M., \u201cSecurity policy definition framework for SOA-based systems,\u201d in 10th International Conference on Web Information Systems Engineering (WISE 2009) (Vossen, J. X. Y. G., Long, D. D. E. eds.), LNCS 5802, Springer-Verlag, pp. 589\u2013596, 2009.","DOI":"10.1007\/978-3-642-04409-0_57"},{"key":"206_CR4","doi-asserted-by":"crossref","unstructured":"Baboescu, F. and Varghese, G., \u201cFast and scalable conflict detection for packet classifiers,\u201d in 10th IEEE International Conference on Network Protocols., IEEE Comput. Soc., pp.270\u2013279, 2002.","DOI":"10.1109\/ICNP.2002.1181414"},{"key":"206_CR5","doi-asserted-by":"crossref","unstructured":"Abassi, R. and Fatmi, S.G.E., \u201cDealing with Multi Security Policies in Communication Networks,\u201d in 5th International Conference on Networking and Services, IEEE, pp. 282\u2013287, 2009.","DOI":"10.1109\/ICNS.2009.24"},{"key":"206_CR6","doi-asserted-by":"crossref","unstructured":"Al-Shaer, E. and Hamed, H., \u201cModeling and Management of Firewall Policies,\u201d IEEE Transactions on Network and Service Management, 1, 1, pp. 2\u201310, 2004.","DOI":"10.1109\/TNSM.2004.4623689"},{"key":"206_CR7","unstructured":"Craven, R., Lobo, J., Lupu, E., Russo, A., Sloman, M. and Bandara, A., \u201cA Formal Framework for Policy Analysis,\u201d Technical Report DTR-2008\/5, Department of Computing, Imperial College London, London, 2008."},{"key":"206_CR8","doi-asserted-by":"crossref","unstructured":"Moffett, J. D. and Sloman, M., \u201cPolicy conflict analysis in distributed system management,\u201d Journal of Organizational Computing, 4, pp. 1\u201322, 1994.","DOI":"10.1080\/10919399409540214"},{"key":"206_CR9","doi-asserted-by":"crossref","unstructured":"Dijkstra, E. W., \u201cA Note on Two Problems in Connection with Graphs,\u201d Numerical Mathematics, 1, pp. 269\u2013271, 1959.","DOI":"10.1007\/BF01386390"},{"key":"206_CR10","doi-asserted-by":"crossref","unstructured":"Tarjan, R. E. \u201cDepth-first search and linear graph algorithms,\u201d SIAM J. Comput., 1, 2, pp. 146\u2013160, 1972.","DOI":"10.1137\/0201010"},{"key":"206_CR11","doi-asserted-by":"crossref","unstructured":"Aspvall, B. and Plass, M. F. and Tarjan, R. E., \u201cA linear-time algorithm for testing the truth of certain quantified boolean formulas,\u201d Inf. Process. Lett., 8, 3, pp. 121\u2013123, 1979.","DOI":"10.1016\/0020-0190(79)90002-4"},{"key":"206_CR12","doi-asserted-by":"crossref","unstructured":"She, W., Yen, I.L., Thuraisingham, B. and Bertino, E., \u201cThe scifc model for information flow control in web service composition,\u201d in 2009 IEEE International Conference on Web Services (ICWS 2009), 2009.","DOI":"10.1109\/ICWS.2009.13"},{"key":"206_CR13","doi-asserted-by":"crossref","unstructured":"Yildiz, U. and Godard, C., \u201cInformation flow control with decentralized service composition,\u201d in 2009 IEEE International Conference on Web Services (ICWS 2009), 2007.","DOI":"10.1109\/ICWS.2007.109"}],"container-title":["New Generation Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00354-012-0206-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00354-012-0206-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00354-012-0206-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T20:15:41Z","timestamp":1743711341000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00354-012-0206-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":13,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2012,6]]}},"alternative-id":["206"],"URL":"https:\/\/doi.org\/10.1007\/s00354-012-0206-8","relation":{},"ISSN":["0288-3635","1882-7055"],"issn-type":[{"type":"print","value":"0288-3635"},{"type":"electronic","value":"1882-7055"}],"subject":[],"published":{"date-parts":[[2012,6]]}}}