{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T22:26:40Z","timestamp":1757456800950},"reference-count":31,"publisher":"Informa UK Limited","issue":"4","license":[{"start":{"date-parts":[[2018,6,4]],"date-time":"2018-06-04T00:00:00Z","timestamp":1528070400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information and Telecommunication"],"published-print":{"date-parts":[[2018,10,2]]},"DOI":"10.1080\/24751839.2018.1479926","type":"journal-article","created":{"date-parts":[[2018,6,4]],"date-time":"2018-06-04T06:37:27Z","timestamp":1528094247000},"page":"428-448","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":3,"title":["Security framework for dynamic service-oriented IT systems"],"prefix":"10.1080","volume":"2","author":[{"given":"Grzegorz","family":"Ko\u0142aczek","sequence":"first","affiliation":[{"name":"Faculty of Computer Science and Management, Wroclaw University of Science and Technology, Wroclaw, Poland"}]},{"given":"Jolanta","family":"Mizera-Pietraszko","sequence":"additional","affiliation":[{"name":"Faculty of Mathematics, Physics and Computer Science, Opole University, Opole, Poland"}]}],"member":"301","published-online":{"date-parts":[[2018,6,4]]},"reference":[{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2007.03.002"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2008.12.005"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1145\/99926.99928"},{"issue":"2","key":"CIT0006","first-page":"45","volume":"54","author":"Bertino E.","year":"2010","journal-title":"Security for Web Services and Service-Oriented Architectures"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.51"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609962"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(12)70016-8"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.08.004"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2011.09.001"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.11.007"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1145\/2693208.2693229"},{"key":"CIT0016","first-page":"1","author":"El-Ramly M.","year":"2004","journal-title":"Msr"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1109\/38.974517"},{"key":"CIT0020","first-page":"213","volume-title":"Trust: Making and breaking cooperative relations","author":"Gambetta D.","year":"2000"},{"key":"CIT0023","first-page":"13","volume":"1","author":"Halfond W. G. J.","year":"2008","journal-title":"Preventing Sql Code Injection By Combining Static and Runtime Analysis"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.06.011"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(99)00064-X"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488501000831"},{"key":"CIT0028","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A. & Grandison, T. (2003). Conditional inference in subjective logic. In Proceedings of the\u00a06th International Conference on Information Fusion, FUSION 2003. doi: 10.1109\/ICIF.2003.177484","DOI":"10.1109\/ICIF.2003.177484"},{"key":"CIT0030","first-page":"167","author":"Kim A.","year":"2007","journal-title":"Security"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1080\/01969720903408797"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3583"},{"key":"CIT0038","first-page":"41","volume":"2","author":"Lewis K. D.","year":"2009","journal-title":"Journal of Computer Science"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090302"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.40"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.400"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2575.2002.00118.x"},{"key":"CIT0046","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1007\/978-3-642-21783-8_16","volume-title":"Advanced research on computer education, simulation and modeling, Pt I","volume":"175","author":"Pei S.","year":"2011"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.11.006"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.56"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2010.03.001"}],"container-title":["Journal of Information and Telecommunication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/24751839.2018.1479926","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/24751839.2018.1479926","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,11,24]],"date-time":"2018-11-24T18:17:31Z","timestamp":1543083451000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/24751839.2018.1479926"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,4]]},"references-count":31,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2018,6,4]]},"published-print":{"date-parts":[[2018,10,2]]}},"alternative-id":["10.1080\/24751839.2018.1479926"],"URL":"https:\/\/doi.org\/10.1080\/24751839.2018.1479926","relation":{},"ISSN":["2475-1839","2475-1847"],"issn-type":[{"value":"2475-1839","type":"print"},{"value":"2475-1847","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,4]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}