{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:22:31Z","timestamp":1737436951378,"version":"3.33.0"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2007,9,1]],"date-time":"2007-09-01T00:00:00Z","timestamp":1188604800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ISeB"],"published-print":{"date-parts":[[2008,1]]},"DOI":"10.1007\/s10257-007-0059-8","type":"journal-article","created":{"date-parts":[[2007,8,31]],"date-time":"2007-08-31T03:09:10Z","timestamp":1188529750000},"page":"83-107","source":"Crossref","is-referenced-by-count":11,"title":["A policy enforcement framework for verification and control of service collaboration"],"prefix":"10.1007","volume":"6","author":[{"given":"W. T.","family":"Tsai","sequence":"first","affiliation":[]},{"given":"Xinyu","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Wei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,9,1]]},"reference":[{"key":"59_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal D, Giles J, Lee KW, Voruganti K, Filali-Adib K (2004) Policy-based validation of SAN configuration. In: Proceedings of 5th IEEE international workshop on policies for distributed systems and networks (POLICY\u201904), pp 77\u201386","DOI":"10.1109\/POLICY.2004.1309152"},{"key":"59_CR3","doi-asserted-by":"crossref","unstructured":"Andersen AH (2004) An introduction to the Web services policy language (WSPL). In: Proceedings of 5th IEEE international workshop on policies for distributed systems and networks, POLICY 2004. Yorktown Heights, pp 189\u2013192","DOI":"10.1109\/POLICY.2004.1309166"},{"issue":"3","key":"59_CR2","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/MSP.2006.81","volume":"4","author":"A Anderson","year":"2006","unstructured":"Anderson A (2006) Web Services Policies. IEEE Secur Priv Mag 4(3):84\u201387","journal-title":"IEEE Secur Priv Mag"},{"key":"59_CR6","unstructured":"BizTalk Server Policy (2002) http:\/\/msdn.microsoft.com\/library\/default.asp?url=\/library\/en-us\/sdk\/ htm\/ebiz_prog_rules_xxxf.asp"},{"key":"59_CR5","doi-asserted-by":"crossref","unstructured":"Chandramouli R (2003) a Policy validation framework for enterprise authorization specification. In: Proceedings of 19th annual computer security application conference, Las Vegas, USA, December 2003","DOI":"10.1109\/CSAC.2003.1254336"},{"key":"59_CR7","unstructured":"Damianou N, Bandara A, Sloman M, Lupu E (2002) A survey of policy specification approaches, technical report, Department of Computing at Imperial College of Science Technology and Medicine"},{"key":"59_CR11","doi-asserted-by":"crossref","unstructured":"Goguen J, Meseguer J (1982) Security policies and security models. In: Proceedings of IEEE symposium on security and privacy, Oakland, USA, April 1982","DOI":"10.1109\/SP.1982.10014"},{"key":"59_CR12","unstructured":"Hirtle D, Boley H, Grosof B, Kifer M, Sintek M, Tabet S, Wagner G (2006) Schema specification of RuleML 0.91. http:\/\/www.ruleml.org\/0.91\/"},{"key":"59_CR14","unstructured":"Java Policy Implementation and Policy file Syntax (1996) http:\/\/java.sun.com\/j2se\/1.4.2\/docs\/guide\/ security\/PolicyFiles.html"},{"key":"59_CR15","doi-asserted-by":"crossref","unstructured":"Kagal L, Berners-Lee T, Connolly D, Weitzner D (2006a) Self-describing delegation networks for the Web. In: Proceedings of 7th IEEE international workshop on policies for distributed systems and networks, London, pp 205\u2013214","DOI":"10.1109\/POLICY.2006.29"},{"key":"59_CR16","unstructured":"Kagal L, Berners-Lee T, Connolly D, Weitzner D (2006b) Using Semantic Web Technologies for Policy Management on the Web. In: Proceedings of 21st national conference on artificial intelligence (AAAI), Boston, USA"},{"key":"59_CR17","unstructured":"Kangasluoma V (1999) Policy specification languages, technical report. Department of Computer Science at Helsinki University of Technology, November"},{"key":"59_CR18","doi-asserted-by":"crossref","unstructured":"Kolovski V, Parsia B, Katz Y, Hendler J (2005) Representing Web service policies in OWL-DL. In: Proceedings of the 4th international semantic Web conference, ISWC 2005, Galway, pp 461\u201375","DOI":"10.1007\/11574620_34"},{"key":"59_CR19","unstructured":"Locasto M, SPCL (2003) Structured Policy Command Language, technical report, Department of Computer Science at Columbia University, May"},{"key":"59_CR20","doi-asserted-by":"crossref","unstructured":"Lupu E, Sloman M (1999) Conflicts in Policy-Based Distributed System Management. IEEE Trans Softw Eng 25(6)","DOI":"10.1109\/32.824414"},{"key":"59_CR21","doi-asserted-by":"crossref","unstructured":"Lymberopoulos L, Lupu E, Sloman M (2003) An adaptive policy based framework for network services management. J Netw Syst Manage 11(3):277\u2013304 (Special Issue on Policy Based Management)","DOI":"10.1023\/A:1025719407427"},{"key":"59_CR22","doi-asserted-by":"crossref","unstructured":"McDaniel P, Prakash A (2003) A Flexible Architecture for Security Policy Enforcement. In: Proceedings of DARPA information survivability conference and exposition","DOI":"10.1109\/DISCEX.2003.1194971"},{"key":"59_CR25","doi-asserted-by":"crossref","unstructured":"Moore B, Ellesson E, Strassner J, Westerinen A (2001) Policy core information model\u2014version 1 specification. IETF RFC 3060","DOI":"10.17487\/rfc3060"},{"key":"59_CR27","unstructured":"OASIS, ebXML: http:\/\/www.ebxml.org\/"},{"key":"59_CR28","unstructured":"OASIS (2005) XACML 2.0 Specification, http:\/\/www.oasis-open.org\/specs\/"},{"key":"59_CR29","unstructured":"Parsia B, Kolovski V, Hendler J (2005) Expressing WS Policies using OWL. In: Proceedings of policy management for the Web workshop, Chiba, pp 29\u201336"},{"key":"59_CR26","unstructured":"Patwardhan A, Korolev V, Kagal L, Joshi A (2004) Declarative policies for describing Web service capabilities and constraints. In: Proceedings of W3C workshop on constraints and capabilities for Web services, Redwood shores, USA"},{"key":"59_CR33","unstructured":"RuleML-powered Policy specification and interchange (2004) http:\/\/policy.ruleml.org\/"},{"key":"59_CR31","unstructured":"Shafiq B, Masood A, Ghafoor A (2006) Policy-based verification of distributed workflows in a multi-domain environment, technical report, https:\/\/www.cerias.purdue.edu\/tools_and_resources\/bibtex_archive\/view_entry.php?bibtex_id= 2969"},{"key":"59_CR32","doi-asserted-by":"crossref","unstructured":"Smith R (2001) Experimenting with Security Policy. In: Proceedings of DARPA information survivability conference and exposition","DOI":"10.1109\/DISCEX.2001.932200"},{"key":"59_CR34","doi-asserted-by":"crossref","unstructured":"Tsai WT (2005) Service-oriented system engineering: a new paradigm. IEEE international workshop on service-oriented system engineering (SOSE), Beijing, pp 3\u20138","DOI":"10.1109\/SOSE.2005.34"},{"key":"59_CR39","unstructured":"Tsai WT, Zhang D, Chen Y, Huang H, Paul R, Liao N (2004) A Software Reliability Model for Web services. In: The 8th IASTED international conference on software engineering and applications, Cambridge, pp 144\u2013149"},{"key":"59_CR36","doi-asserted-by":"crossref","unstructured":"Tsai WT, Liu X, Chen Y (2005a) Distributed policy specification and enforcement in service-oriented business systems. In: Proceedings of the IEEE international conference on e-business engineering, Beijing, China, pp 10\u201317","DOI":"10.1109\/ICEBE.2005.52"},{"key":"59_CR37","unstructured":"Tsai WT, Wei X, Chen Y (2005b) A robust testing framework for verifying Web services by completeness and consistency analysis. In: IEEE international workshop on service-oriented system engineering (SOSE), Beijing, pp 151\u2013158"},{"key":"59_CR38","unstructured":"Tsai WT, Chen Y, Paul R, Huang H, Zhou X, Wei X (2005c) Adaptive testing, Oracle generation, and test script ranking for Web services. In: 29th IEEE annual international computer software and applications conference (COMPSAC), Edinburgh, pp 101\u2013106"},{"issue":"5","key":"59_CR35","first-page":"295","volume":"82","author":"WT Tsai","year":"2006","unstructured":"Tsai WT, Chen Y, Paul R, Zhou X, Fan C (2006) Simulation verification and validation by dynamic policy specification and enforcement. SIMULATION. Trans Soc Model Simul 82(5):295\u2013310","journal-title":"Trans Soc Model Simul"},{"key":"59_CR40","unstructured":"UDDI Version 3 Specification, available at http:\/\/uddi.org\/pubs\/uddi_v3.htm"},{"key":"59_CR42","unstructured":"Web Services Policy 1.2\u2014Framework (WS-Policy) (2006) W3C member submission, 25 April 2006, available at http:\/\/www.w3.org\/Submission\/2006\/06\/"},{"key":"59_CR43","unstructured":"XACML-Based Web Services Policy Constraint Language (WS-PolicyConstraints), October 2005, available at http:\/\/research.sun.com\/projects\/xacml\/"},{"key":"59_CR41","doi-asserted-by":"crossref","unstructured":"Xiao B, Tsai WT, Huang Q, Chen Y, Paul R (2006) SOA Collaboration Modeling, Analysis, and Simulation in PSML-C. In: Proceedings of the IEEE international conference on e-business engineering, Shangai, China, pp 639\u2013646","DOI":"10.1109\/ICEBE.2006.94"}],"container-title":["Information Systems and e-Business Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-007-0059-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10257-007-0059-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-007-0059-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T19:31:33Z","timestamp":1737401493000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10257-007-0059-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9,1]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,1]]}},"alternative-id":["59"],"URL":"https:\/\/doi.org\/10.1007\/s10257-007-0059-8","relation":{},"ISSN":["1617-9846","1617-9854"],"issn-type":[{"type":"print","value":"1617-9846"},{"type":"electronic","value":"1617-9854"}],"subject":[],"published":{"date-parts":[[2007,9,1]]}}}