{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:41:42Z","timestamp":1760708502554},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,2,2]],"date-time":"2013-02-02T00:00:00Z","timestamp":1359763200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SOCA"],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1007\/s11761-013-0127-5","type":"journal-article","created":{"date-parts":[[2013,2,1]],"date-time":"2013-02-01T11:04:55Z","timestamp":1359716695000},"page":"217-230","source":"Crossref","is-referenced-by-count":4,"title":["XrML-RBLicensing approach adapted to the BPEL process of composite web services"],"prefix":"10.1007","volume":"7","author":[{"given":"Hanine","family":"Tout","sequence":"first","affiliation":[]},{"given":"Azzam","family":"Mourad","sequence":"additional","affiliation":[]},{"given":"Hadi","family":"Otrok","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,2,2]]},"reference":[{"key":"127_CR1","doi-asserted-by":"crossref","unstructured":"Ardagna CA, Damiani E, De Capitani di Vimercati S, Samarati P (2006) A web service architecture for enforcing access control policies. Electron Notes Theor Comput Sci 142:47\u201362","DOI":"10.1016\/j.entcs.2004.09.044"},{"key":"127_CR2","unstructured":"Atkinson B et al. Web services security (WS-Security). http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=wss"},{"key":"127_CR3","unstructured":"Bhatti R, Joshi J, Bertino E, Ghafoor A (2003) Access control in dynamic XML-based web-services with X-RBAC. In: Proceedings of the international conference on web services (ICWS03), pp 243\u2013249"},{"key":"127_CR4","unstructured":"Bodkin R (2004) Enterprise security aspects. In: Proceedings of the AOSD 04 workshop on AOSD technology for application-level security (AOSD04:AOSDSEC)"},{"key":"127_CR5","doi-asserted-by":"crossref","unstructured":"Charfi A, Mezini M (2004) Aspect-oriented web service composition with AO4BPEL. In ECOWS04","DOI":"10.1007\/978-3-540-30209-4_13"},{"key":"127_CR6","unstructured":"ContentGuard. XrML The digital rights language for trusted content and services. http:\/\/www.xrml.org\/"},{"key":"127_CR7","unstructured":"DeWin B (2004) Engineering application level security through aspect oriented software development. PhD thesis, Katholieke Universiteit Leuven"},{"issue":"7","key":"127_CR8","doi-asserted-by":"crossref","first-page":"27","DOI":"10.5381\/jot.2007.6.7.a2","volume":"6","author":"J Evermann","year":"2007","unstructured":"Evermann J (2007) A meta-level specification and profile for AspectJ in UML. J Object Technol 6(7):27\u201349","journal-title":"J Object Technol"},{"key":"127_CR9","unstructured":"Fuentes L, Sanchez P (2006) Elaborating UML 2.0 profiles for AO design. In: Proceedings of the international workshop on aspect-oriented modeling"},{"key":"127_CR10","unstructured":"Huang M, Wang C, Zhang L (2004) Toward a reusable and generic security aspect library. In: Proceedings of the AOSD 04 workshop on AOSD technology for application level security (AOSD04:AOSDSEC)"},{"key":"127_CR11","unstructured":"Ken North Computing. XML and web services: message processing vulnerabilities. http:\/\/www.webservicessummit.com\/Articles\/MessagingThreats.htm"},{"key":"127_CR12","doi-asserted-by":"crossref","unstructured":"Kiczales G, Hilsdale E, Hugunin J, Kersten M, Palm J, Griswold WG (2001) An overview of AspectJ. In: Proceedings of the 15th european conference on object-oriented programming (ECOOP01), pp 327\u2013353, London, UK. Springer","DOI":"10.1007\/3-540-45337-7_18"},{"key":"127_CR13","doi-asserted-by":"crossref","unstructured":"Kiczales G, Lamping J, Menhdhekar A, Maeda Ch, Lopes C, Loingtier J-M, Irwin J (1997) Aspect-oriented programming. In: Ak\u00ffsit M, Matsuoka S (eds) In: Proceedings european conference on object-oriented programming, vol. 1241, pp. 220\u2013242. Springer, Berlin","DOI":"10.1007\/BFb0053381"},{"key":"127_CR14","unstructured":"Lockhart B et al. OASIS security services TC (SAML). http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=security"},{"key":"127_CR15","unstructured":"Moses T: OASIS eXtensible access control markup language(XACML), OASIS standard 2.0. http:\/\/www.oasis-open.org\/committees\/xacml\/"},{"key":"127_CR16","unstructured":"Nolan P (2004) Understand WS-Policy processing. IBM Corporation, Technical report"},{"key":"127_CR17","doi-asserted-by":"crossref","unstructured":"Paci F, Bertino E, Crampton J (2008) An access-control framework for WS-BPEL. Int J Web Serv Res 5(3):20\u201343","DOI":"10.4018\/jwsr.2008070102"},{"key":"127_CR18","unstructured":"Pavlich-Mariscal J, Michel L, Demurjian S (2007) Enhancing UML to model custom security aspects. In: Proceedings of the 11th international workshop on aspect-oriented modeling AOM@AOSD07"},{"key":"127_CR19","unstructured":"Schlimmer J (2004) Web services policy framework (WS-Policy). http:\/\/www-128.ibm.com\/developerworks\/webservices\/library\/specification\/ws-polfram\/"},{"key":"127_CR20","doi-asserted-by":"crossref","unstructured":"Shah V (2003) An aspect-oriented security assurance solution, Technical Report AFRL-IF-RS-TR-2003-254, Cigital Labs","DOI":"10.21236\/ADA419305"},{"key":"127_CR21","doi-asserted-by":"crossref","unstructured":"Tonella P, Di Francescomarino C (2009) Cooperative aspect oriented programming for executable business processes. In: Proceedings of The the 2009 ICSE workshop on principles of engineering service oriented systems., Vancouver, Canada","DOI":"10.1109\/PESOS.2009.5068826"}],"container-title":["Service Oriented Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11761-013-0127-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11761-013-0127-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11761-013-0127-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,8]],"date-time":"2019-07-08T23:42:09Z","timestamp":1562629329000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11761-013-0127-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2,2]]},"references-count":21,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,9]]}},"alternative-id":["127"],"URL":"https:\/\/doi.org\/10.1007\/s11761-013-0127-5","relation":{},"ISSN":["1863-2386","1863-2394"],"issn-type":[{"value":"1863-2386","type":"print"},{"value":"1863-2394","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,2,2]]}}}