{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T01:18:57Z","timestamp":1709255937709},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,2,6]],"date-time":"2018-02-06T00:00:00Z","timestamp":1517875200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Iran J Comput Sci"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s42044-018-0008-3","type":"journal-article","created":{"date-parts":[[2018,2,6]],"date-time":"2018-02-06T08:42:11Z","timestamp":1517906531000},"page":"65-87","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["CRESCENT+: a self-protecting framework for reliable composite web service delivery"],"prefix":"10.1007","volume":"1","author":[{"given":"Islam","family":"Elgedawy","sequence":"first","affiliation":[]},{"given":"Sara","family":"Khurshid","sequence":"additional","affiliation":[]},{"given":"Rahat","family":"Masood","sequence":"additional","affiliation":[]},{"given":"Muhammad Awais","family":"Shibli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,6]]},"reference":[{"key":"8_CR1","unstructured":"SecurITree - attack tree-based modeling software. Amenaza Technologies Limited [Online]. http:\/\/www.amenaza.com\/ . Accessed 5 Sep 2014"},{"key":"8_CR2","unstructured":"The STRIDE Threat Model, Microsoft [Online]. http:\/\/msdn.microsoft.com\/en-us\/library\/ee823878(v=cs.20).aspx . Accessed: 20 Sep 2014"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Amir, Y., Coan, B., Kirsch, J., Lane, J.: Customizable fault tolerance for wide-area replication. In: Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (2007)","DOI":"10.1109\/SRDS.2007.40"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Bertino, E., Martino, L., Paci, F., Squicciarini, A.: Web services threats, vulnerabilities, and countermeasures. In: Security for Web Services and Service-Oriented Architectures, pp. 25\u201344. Springer, Berlin (2010)","DOI":"10.1007\/978-3-540-87742-4_3"},{"issue":"1","key":"8_CR5","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s10619-005-1075-7","volume":"18","author":"R Bhatti","year":"2005","unstructured":"Bhatti, R., Bertino, E., Ghafoor, A.: A trust-based context-aware access control model for web-services. Distrib. Parallel Databases. 18(1), 83\u2013105 (2005)","journal-title":"Distrib. Parallel Databases."},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Biskup, J., Carminati, B., Ferrari, E., Muller, F., Wortmann, S.: Towards secure execution orders for compositeweb services. In: Web Services, 2007. ICWS 2007. IEEE International Conference on IEEE, pp. 489\u2013496 (2007)","DOI":"10.1109\/ICWS.2007.179"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Carminati, B., Ferrari, E., Hung, P.C.: Web service composition: a security perspective. In: Web Information Retrieval and Integration, 2005. WIRI\u201905. Proceedings. International Workshop on Challenges in IEEE, pp. 248\u2013253 (2005)","DOI":"10.1109\/WIRI.2005.36"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Carminati, B., Ferrari, E., Hung, P.C.: Security conscious web service composition. In: Web Services, 2006. ICWS\u201906. International Conference on IEEE, pp. 489\u2013496 (2006)","DOI":"10.1109\/ICWS.2006.115"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Charfi, A., Mezini, M.: Using aspects for security engineering of web service compositions. In: Web Services, 2005. ICWS 2005. Proceedings. 2005 IEEE International Conference on IEEE, pp. 59\u201366 (2005)","DOI":"10.1109\/ICWS.2005.126"},{"issue":"2","key":"8_CR10","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1093\/comjnl\/bxu019","volume":"58","author":"I Elgedawy","year":"2015","unstructured":"Elgedawy, I.: CRESCENT: a reliable framework for durable composite web services management. Comput. J. 58(2), 280\u2013299 (2015)","journal-title":"Comput. J."},{"issue":"2","key":"8_CR11","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/s13369-014-1428-5","volume":"40","author":"I Elgedawy","year":"2015","unstructured":"Elgedawy, I.: USTA: an aspect-oriented knowledge management framework for reusable assets discovery. Arab. J. Sci. Eng. 40(2), 451\u2013474 (2015)","journal-title":"Arab. J. Sci. Eng."},{"issue":"5","key":"8_CR12","doi-asserted-by":"publisher","first-page":"355","DOI":"10.7763\/IJCTE.2016.V8.1071","volume":"8","author":"I Elgedawy","year":"2016","unstructured":"Elgedawy, I.: GEMINI: a hybrid byzantine fault tolerant protocol for reliable composite web services orchestrated delivery. Int. J. Comput. Theory Eng. (IJCTE) 8(5), 355\u2013361 (2016)","journal-title":"Int. J. Comput. Theory Eng. (IJCTE)"},{"issue":"7","key":"8_CR13","doi-asserted-by":"publisher","first-page":"646","DOI":"10.17706\/jsw.11.7.646-655","volume":"11","author":"I Elgedawy","year":"2016","unstructured":"Elgedawy, I.: JAMEJAM: a framework for automating the service discovery process. J. Softw. (JSW) 11(7), 646\u2013655 (2016)","journal-title":"J. Softw. (JSW)"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Elgedawy, I.: Wsla extensions for managing composite semantic web services. In: Proceedings of the first IEEE International Conference on Knowledge Engineering and Applications (ICKEA). Singapore (2016)","DOI":"10.1109\/ICKEA.2016.7802988"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Elgedawy, I.: DISCO: a dynamic self-configuring discovery service for semantic web services. In: Proceedings of the 7th International Conference on Cloud Computing and Service Science (CLOSER). Porto, Portugal (2017)","DOI":"10.5220\/0006234703350342"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Ghosh, R., Naik, V.: Biting off safely more than you can chew: Predictive analytics for resource over-commit in iaas cloud. In: IEEE 5th International Conference on Cloud Computing (2012)","DOI":"10.1109\/CLOUD.2012.131"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Goettelmann, E., Fdhila, W., Godart, C.: Partitioning and cloud deployment of composite web services under security constraints. In: Cloud Engineering (IC2E), 2013 IEEE International Conference on IEEE, pp. 193\u2013200 (2013)","DOI":"10.1109\/IC2E.2013.22"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Hutter, D., Volkamer, M.: Information flow control to secure dynamic web service composition. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) Security in Pervasive Computing. SPC 2006. Lecture Notes in Computer Science, vol. 3934, pp. 196\u2013210. Springer, Berlin (2006)","DOI":"10.1007\/11734666_15"},{"key":"8_CR19","unstructured":"Kakogiannis, D.: M\/M\/1 Simulator. https:\/\/www.mathworks.com\/matlabcentral\/fileexchange\/6743-mm1-simulator (2005). Accessed: 12 July 2017"},{"key":"8_CR20","unstructured":"Karimi, S., Babamir, S.: Efficient intelligent secure for web service composition. In: International Conference on Communication Engineering (2010)"},{"issue":"1","key":"8_CR21","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MC.2003.1160055","volume":"36","author":"JO Kephart","year":"2003","unstructured":"Kephart, J.O., Chess, D.M.: The vision of autonomic computing. Computer 36(1), 41\u201350 (2003)","journal-title":"Computer"},{"key":"8_CR22","doi-asserted-by":"publisher","unstructured":"Madan, B.B., Goseva-Popstojanova, K., Vaidyanathan, K., Trivedi, K.S.: A method for modeling and quantifying the security attributes of intrusion tolerant systems. pp. 167\u2013186 (2004). https:\/\/doi.org\/10.1016\/j.peva.2003.07.008","DOI":"10.1016\/j.peva.2003.07.008"},{"key":"8_CR23","unstructured":"Mao, Y., Junqueira, F.P., Marzullo, K.: Mencius: building efficient replicated state machines for wans. In: Proceedings of the 8th USENIX Conference on Operating systems Design and Implementation, OSDI\u201908, pp. 369\u2013384 (2008)"},{"key":"8_CR24","unstructured":"OASIS Committe: Security assertion markup language (saml). http:\/\/www.oasis-open.org\/committees\/security (2013). Accessed 12 July 2017"},{"key":"8_CR25","unstructured":"OASIS Committee Specification 1: eXtensible Access Control Markup Language (XACML) version 3.0. (oasis 2010). http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-cs-01-en.pdf (2010). Accessed 12 July 2017"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Papazoglou, M.P., van\u00a0den Heuvel, W.J.: Web services management: a survey 58\u201364 (2005)","DOI":"10.1109\/MIC.2005.137"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Sathiaseelan, J.: Architectural framework for secure composite web services. Citeseer (2013)","DOI":"10.5120\/13211-0592"},{"key":"8_CR28","doi-asserted-by":"publisher","unstructured":"Satoh, F., Tokuda, T.: Security policy composition for composite web services. Serv. Comput. IEEE Trans. 4(4), 314\u2013327 (2011). https:\/\/doi.org\/10.1109\/TSC.2010.40","DOI":"10.1109\/TSC.2010.40"},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"She, W., Yen, I.L., Thuraisingham, B.: Enhancing security modeling for web services using delegation and pass-on. In: Web Services, 2008. ICWS\u201908. IEEE International Conference on IEEE, pp. 545\u2013552 (2008)","DOI":"10.1109\/ICWS.2008.23"},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"Souza, A.R.R., Silva, B.L. B., Lins, F.A.A., Damasceno J.C., Rosa N.S., Maciel, P.R.M., Medeiros, R.W.A., Stephenson, B., Motahari-Nezhad, H.R., Li, J., Northfleet, C.: Incorporating security requirements into service composition: from modelling to execution. In: Baresi L., Chi CH., Suzuki J. (eds) Service-Oriented Computing. Lecture Notes in Computer Science, vol. 5900, pp. 373\u2013388. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-10383-4_27"},{"issue":"1","key":"8_CR31","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/S1005-8885(13)60253-8","volume":"20","author":"D Yan","year":"2013","unstructured":"Yan, D., Tian, Y., Huang, J., Yang, F.: Privacy-aware RBAC model for web services composition. J. China Univ. Posts Telecommun. 20(1), 30\u201334 (2013)","journal-title":"J. China Univ. Posts Telecommun."}],"container-title":["Iran Journal of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s42044-018-0008-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42044-018-0008-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42044-018-0008-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,13]],"date-time":"2022-08-13T23:32:34Z","timestamp":1660433554000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s42044-018-0008-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,6]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["8"],"URL":"https:\/\/doi.org\/10.1007\/s42044-018-0008-3","relation":{},"ISSN":["2520-8438","2520-8446"],"issn-type":[{"value":"2520-8438","type":"print"},{"value":"2520-8446","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,6]]},"assertion":[{"value":"30 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 February 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}