{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T15:41:22Z","timestamp":1725464482610},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1109\/apscc.2009.5394129","type":"proceedings-article","created":{"date-parts":[[2010,1,26]],"date-time":"2010-01-26T17:34:08Z","timestamp":1264527248000},"page":"126-133","source":"Crossref","is-referenced-by-count":2,"title":["Enforcement of server commitments and system global constraints in SOA-based systems"],"prefix":"10.1109","author":[{"given":"Tin","family":"Lam","sequence":"first","affiliation":[]},{"given":"Naftaly","family":"Minsky","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2008.18"},{"key":"ref11","article-title":"Representation and evaluation of security policies for distributed system services","author":"ryutov","year":"2000","journal-title":"DARPA Information Survivability Conference and Exposition"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-48749-2","author":"vitek","year":"1999","journal-title":"Secure Internet Programming Security Issues for Mobile and Distributed Objects"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2006.62"},{"journal-title":"Smart monitors for composed services In IEEE International Conference on Web Services","year":"2004","author":"baresi","key":"ref14"},{"key":"ref15","article-title":"Runtime monitoring of instances and classes of web service compositions","author":"barbon","year":"2006","journal-title":"IEEE International Conference on Web Services"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISADS.2005.1452016"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2005.128"},{"key":"ref4","article-title":"Trade commission says geocities violated privacy rules","author":"clausing","year":"1998","journal-title":"New York Times"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/944217.944238"},{"journal-title":"Eff complaint to ftc regarding aol&#x2019; s massive data leak","year":"2006","key":"ref6"},{"journal-title":"AOL's Massive Data Leak","year":"2006","key":"ref5"},{"journal-title":"Law governed interaction (lgi) A distributed coordination and control mechanism","year":"2005","author":"minsky","key":"ref8"},{"journal-title":"Trusted remote verification of web services","year":"2009","author":"lyle","key":"ref7"},{"key":"ref2","article-title":"A hierarchical policy specification language, and enforcement mechanism, for governing digital enterprises","author":"ao","year":"2002","journal-title":"Proc IEEE 3rd Int Workshop on Policies for Distributed Systems and Networks"},{"key":"ref1","article-title":"Flexible regulation of distributed coalitions","author":"ao","year":"2003","journal-title":"European Symp Research in Computer Security (ESORICS)"},{"journal-title":"Lgi reference manual","year":"2005","author":"minsky","key":"ref9"}],"event":{"name":"2009 IEEE Asia-Pacific Services Computing Conference (APSCC)","start":{"date-parts":[[2009,12,7]]},"location":"Singapore, Singapore","end":{"date-parts":[[2009,12,11]]}},"container-title":["2009 IEEE Asia-Pacific Services Computing Conference (APSCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5374429\/5394078\/05394129.pdf?arnumber=5394129","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T04:06:11Z","timestamp":1497845171000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5394129\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/apscc.2009.5394129","relation":{},"subject":[],"published":{"date-parts":[[2009,12]]}}}