{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:28:46Z","timestamp":1759091326629,"version":"3.33.0"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2007,11,20]],"date-time":"2007-11-20T00:00:00Z","timestamp":1195516800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SOCA"],"published-print":{"date-parts":[[2007,11,29]]},"DOI":"10.1007\/s11761-007-0018-8","type":"journal-article","created":{"date-parts":[[2007,11,19]],"date-time":"2007-11-19T16:02:40Z","timestamp":1195488160000},"page":"223-247","source":"Crossref","is-referenced-by-count":37,"title":["Data provenance in SOA: security, reliability, and integrity"],"prefix":"10.1007","volume":"1","author":[{"given":"W. T.","family":"Tsai","sequence":"first","affiliation":[]},{"given":"Xiao","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Yinong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ray","family":"Paul","sequence":"additional","affiliation":[]},{"given":"Jen-Yao","family":"Chung","sequence":"additional","affiliation":[]},{"given":"Dawei","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,11,20]]},"reference":[{"unstructured":"Altova, Altova XMLSpy\u00ae 2005. http:\/\/www.altova.com\/products_ide.html","key":"18_CR1"},{"doi-asserted-by":"crossref","unstructured":"Bell D, LaPadula L (1976) Secure computer system: unified exposition and multics interpretation. Technical Report, MITRE Corporation","key":"18_CR2","DOI":"10.21236\/ADA023588"},{"doi-asserted-by":"crossref","unstructured":"Bishop M (2002) Computer security: art and science","key":"18_CR3","DOI":"10.1163\/9789004487277_006"},{"issue":"1","key":"18_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1057977.1057978","volume":"37","author":"R Bose","year":"2005","unstructured":"Bose R and Frew J (2005). Lineage retrieval for scientific data processing: a survey. ACM Comput Surv 37(1): 1\u201328","journal-title":"ACM Comput Surv"},{"doi-asserted-by":"crossref","unstructured":"Bunemaaan P, Khanna S, Tan WC (2001) Why and where: a characterization of data provenance. In: ICDT","key":"18_CR5","DOI":"10.1007\/3-540-44503-X_20"},{"unstructured":"Chappell D (2004) Enterprise Service Bus. O\u2019 Reilly Media, Sebastopal","key":"18_CR6"},{"unstructured":"Chen Y, Tsai WT (2007) Distributed software development in service-oriented paradigm. Manuscript, http:\/\/asusrl.eas.asu.edu\/share\/services\/book\/DSDinSOP.pdf","key":"18_CR7"},{"unstructured":"Chen L, Tan V, Xu F, Biller A (2005) A proof of concept: provenance in a service oriented architecture. In: Proceedings of the Fourth All Hands Meeting (AHM)","key":"18_CR8"},{"unstructured":"Clarke DG, Clark DM (1975) Lineage, in elements of spatial data quality. In: Guptill SC, Morrison JL (eds) Elsevier Science, Oxford pp 13\u201330","key":"18_CR9"},{"unstructured":"DCIO, DOD OASD NII (2004) Net-Centric Checklist\u201d, version 2.1.2, March 31st, 2004","key":"18_CR10"},{"unstructured":"Dikmans L (2007) Testing BPEL in the real world. http:\/\/www.oracle.com\/technology\/oramag\/oracle\/07-nov\/067bpel.html","key":"18_CR11"},{"doi-asserted-by":"crossref","unstructured":"Foster I, Vockler J, Wilde M, Zhao Y (2002) Chimera: a virtual data system for representing, querying, and automating data derivation. In: Proc. of scientific and statistical database management","key":"18_CR12","DOI":"10.1109\/SSDM.2002.1029704"},{"unstructured":"GAO (2002) Assessing the reliability of computer-processed data. External Version 1","key":"18_CR13"},{"unstructured":"Goble C (2002) Position Statement: Musings on Provenance, Workflow and (Semantic Web) Annotations for Bioinformatics. In: Workshop on data derivation and provenance, Chicago","key":"18_CR14"},{"doi-asserted-by":"crossref","unstructured":"Goguen J, Meseguer J (1982) Security policies and security models. In: Proceedings of the symposium on security and privacy. IEEE Computer Society","key":"18_CR15","DOI":"10.1109\/SP.1982.10014"},{"doi-asserted-by":"crossref","unstructured":"Goguen J, Meseguer J (1984) Unwinding and Inference Control. In: Proceedings of 1984 IEEE symposium on security and privacy, Oakland, pp 75\u201386","key":"18_CR16","DOI":"10.1109\/SP.1984.10019"},{"doi-asserted-by":"crossref","unstructured":"Groth P, Luck M, Moreau L (2004) A protocol for recording provenance in service-oriented grids. In: Proc. of 8th international conference on principles of distributed systems (OPODOS\u201904)","key":"18_CR17","DOI":"10.1007\/11516798_9"},{"unstructured":"Hwang KW (2006) Information services in service oriented architecture\u2014challenges and opportunities. Keynote of SEKE\u201906. http:\/\/www.ksi.edu\/seke\/keynote\/SEKE2006-KW.pdf","key":"18_CR18"},{"unstructured":"IBM (2007) IBM Systems z9 Enterprise class. Retrieved at http:\/\/www-03.ibm.com\/systems\/z\/z9ec\/","key":"18_CR19"},{"unstructured":"IBM (2007) Service data objects. Retrieved at http:\/\/www-128.ibm.com\/developerworks\/webservices\/library\/specification\/ws-sdo\/","key":"18_CR20"},{"unstructured":"Jordan D, Evdemon J (2007) Web Services Business Process Execution Language Version 2.0, OASIS, http:\/\/docs.oasis-open.org\/wsbpel\/2.0\/wsbpel-v2.0.html","key":"18_CR21"},{"unstructured":"Kernochan W (2006) Mainframe security changes as Web services arrive. Retrieved at http:\/\/searchwebservices.techtarget.com\/tip\/0,289483,sid26_gci1202408,00.htm","key":"18_CR22"},{"unstructured":"Laskey KJ (2005) Metadata concepts to support a net-centric data environment. Technical Report, MITRE","key":"18_CR23"},{"doi-asserted-by":"crossref","unstructured":"Lanter DP (1991) Design of a lineage-based meta-data base for GIS. In: Cartography and geographic information systems, vol 18","key":"18_CR24","DOI":"10.1559\/152304091783786718"},{"unstructured":"Miles S, Groth P, Branco M, Moreau L (2005) The requirements of recording and using provenance in e-Science experiments. Technical Report, Electronics and Computer Science, University of Southampton","key":"18_CR25"},{"unstructured":"Muniswamy-Reddy KK (2006) Deciding how to store provenance. Techni Technical Report TR-03-06, Harvard University, vol 18","key":"18_CR26"},{"unstructured":"Parasoft, SOAP Test Data Sheet. http:\/\/www.parasoft.com\/jsp\/products\/quick_facts.jsp?product=SOAP","key":"18_CR27"},{"doi-asserted-by":"crossref","unstructured":"Paul R (2005) DoD towards software services. In: Proc. of 10th IEEE international workshop on object-oriented real-time dependable systems (WORDS 05), pp 3\u20136","key":"18_CR28","DOI":"10.1109\/WORDS.2005.30"},{"unstructured":"Paul R, Tsai WT, Bayne J (2005) The impact of SOA policy-based computing on C2 interoperation and computing. In: 10th international command and control research and technology symposium (ICCRTS), McLean, Virginia","key":"18_CR29"},{"doi-asserted-by":"crossref","unstructured":"Portougal V, Sundaram D (2005) Business processes: operational solutions for SAP implementation. IMR Press, Hershey","key":"18_CR30","DOI":"10.4018\/978-1-59140-979-3"},{"unstructured":"Rajbhandari S, Walker DW (2004) Support for provenance in a service-based computing grid. In: UK e-Science All Hands Meeting","key":"18_CR31"},{"unstructured":"O\u2019Reilly T (2005) What is Web 2.0: design patterns and business models for the next generation of software. http:\/\/www.oreillynet.com\/pub\/a\/oreilly\/tim\/news\/2005\/09\/30\/what-is-web-20.html?page=1","key":"18_CR32"},{"key":"18_CR33","volume-title":"Applied probability models with optimizing applications","author":"S Ross","year":"1970","unstructured":"Ross S (1970). Applied probability models with optimizing applications. Holden-Day, San Francisco"},{"issue":"3","key":"18_CR34","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/1084805.1084812","volume":"34","author":"YL Simmhan","year":"2005","unstructured":"Simmhan YL, Plale B and Gannon D (2005). A survey of data provenance in e-science. SIGMOD Rec 34(3): 31\u201336","journal-title":"SIGMOD Rec"},{"doi-asserted-by":"crossref","unstructured":"Simmhan YL, Plale B, Gannon D, Marru S (2006) A framework for collecting provenance in data-centric scientific workflows. In: Intl WWW Conference, SPARWAR, SPARWAR\/PEO C4 I& space SBIR panel review. Presentation slides","key":"18_CR35","DOI":"10.1109\/ICWS.2006.5"},{"doi-asserted-by":"crossref","unstructured":"Tan V, Groth P, Miles S, Jiang S, Munroe S, Tsasakou S, Moreau L (2006) Security issues in a SOA-based provenance system. In: Proceedings of the international provenance and annotation workshop 2006 (IPAW 2006)","key":"18_CR36","DOI":"10.1007\/11890850_21"},{"unstructured":"Tidwell D (2001) UDDI4J: matchmaking for Web services. http:\/\/www-106.ibm.com\/developerworks\/library\/ws-uddi4j.html","key":"18_CR37"},{"unstructured":"Tsai WT (2004) Integrated ACDATE \/ scenario model: the meta model. Technical Report, Department of Computer Science, Arizona State University","key":"18_CR38"},{"doi-asserted-by":"crossref","unstructured":"Tsai WT (2005) Service-oriented system engineering: a new paradigm. In: IEEE international workshop on service-oriented system engineering (SOSE), Beijing, pp 3\u20138","key":"18_CR39","DOI":"10.1109\/SOSE.2005.34"},{"doi-asserted-by":"crossref","unstructured":"Tsai WT, Bai X, Chen Y, Zhou X (2005) Web service group testing with windowing mechanisms. In: IEEE international workshop on service-oriented system engineering (SOSE), Beijing, pp 213\u2013218","key":"18_CR40","DOI":"10.1109\/SOSE.2005.41"},{"doi-asserted-by":"crossref","unstructured":"Tsai WT, Chen Y, Paul R, Huang H, Zhou X, Wei X (2005) Adaptive testing, Oracle generation, and test script ranking for Web services. In: 29th annual international computer software and applications conference (COMPSAC), Edinburgh, Scotland, pp 101\u2013106","key":"18_CR41","DOI":"10.1109\/COMPSAC.2005.40"},{"doi-asserted-by":"crossref","unstructured":"Tsai WT, Lee YH, Cao Z, Chen Y, Xiao B (2006) Real-time service-oriented architecture. Department of Computer Science and Engineering, Arizona State University, Tempe","key":"18_CR42","DOI":"10.1109\/SOSE.2006.27"},{"doi-asserted-by":"crossref","unstructured":"Tsai WT, Liu X, Chen Y (2005) Distributed policy specification and enforcement in service-oriented business systems. In: IEEE international conference on e-Business engineering (ICEBE), Beijing, pp 10\u201317","key":"18_CR43","DOI":"10.1109\/ICEBE.2005.52"},{"unstructured":"Tsai WT, Paul RA, Xiao B, Cao Z, Chen Y (2005) PSML-S: a process specification and modeling language for service oriented computing. In: The 9th IASTED international conference on software engineering and applications (sEA), Phoenix, pp 160\u2013167","key":"18_CR44"},{"doi-asserted-by":"crossref","unstructured":"Tsai WT, Song W, Paul R, Cao Z, Huang H (2004) Services- oriented dynamic reconfiguration framework for dependable distributed computing. COMPSAC, pp 554\u2013559","key":"18_CR45","DOI":"10.1109\/CMPSAC.2004.1342894"},{"unstructured":"Tsai WT, Zhang D, Chen Y, Huang H, Paul R, Liao N (2004) A software reliability model for Web services. In: the 8th IASTED international conference on software engineering and applications, Cambridge, pp 144\u2013149","key":"18_CR46"},{"unstructured":"Vasquez I, Gomadam K, Patterson S (2005) Framework for representing provenance for Web services and processes. Technical Report, LSDIS Lab","key":"18_CR47"}],"container-title":["Service Oriented Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11761-007-0018-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11761-007-0018-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11761-007-0018-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T17:37:38Z","timestamp":1737567458000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11761-007-0018-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11,20]]},"references-count":47,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2007,11,29]]}},"alternative-id":["18"],"URL":"https:\/\/doi.org\/10.1007\/s11761-007-0018-8","relation":{},"ISSN":["1863-2386","1863-2394"],"issn-type":[{"type":"print","value":"1863-2386"},{"type":"electronic","value":"1863-2394"}],"subject":[],"published":{"date-parts":[[2007,11,20]]}}}