{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:30:00Z","timestamp":1725553800653},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10,25]]},"DOI":"10.1109\/iccta40200.2016.9513230","type":"proceedings-article","created":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T18:19:53Z","timestamp":1629224393000},"page":"86-91","source":"Crossref","is-referenced-by-count":1,"title":["A Repaired Genetic Algorithm Based Approach for Web Service Security Negotiation"],"prefix":"10.1109","author":[{"given":"Amira","family":"Abdelatey","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"Elkawkagy","sequence":"additional","affiliation":[]},{"given":"Ashraf","family":"El-sisi","sequence":"additional","affiliation":[]},{"given":"Arabi","family":"Keshk","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/978-1-4614-7518-7_13"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1016\/S0921-8890(98)00029-3"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/CITA.2011.5999537"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/ICWS.2009.157"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TSC.2010.44"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1007\/978-1-4614-7518-7_18"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/CEC.2010.5586164"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1007\/978-1-4614-6940-7_4"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/CIMCA.2008.104"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/eScience.2008.110"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/4236.991449"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1023\/A:1008746126376"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ISSA.2010.5588269"},{"year":"2005","author":"weerawarana","journal-title":"Web Services Platform Architecture SOAP WSDL WS-Policy WS-Addressing WS-BPEL WS-Reliable Messaging and More","key":"ref5"},{"key":"ref8","first-page":"371","article-title":"Influence of the population size on the genetic algorithm performance in case of cultivation process modelling","author":"roeva","year":"2013","journal-title":"Computer Science and Information Systems (FedCSIS) Federated Conference on"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/1180367.1180382"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1108\/S1572-832320150000024022"},{"key":"ref9","article-title":"A Survey of Approaches to Web Service Discovery in Service&#x2014;Oriented Architectures, Innovations","author":"zunino","year":"2012","journal-title":"Database Design Web Applications and Information Systems Management"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1504\/IJBIS.2012.047531"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/SERVICES-I.2009.95"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/TEVC.2002.802874"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/WISE.2003.1254461"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1007\/978-1-4471-0427-8_18"},{"key":"ref23","first-page":"116","article-title":"The GENITOR Algorithm and Selection Pressure: Why Rank-Based Allocation of Reproductive Trials is Best","author":"whitley","year":"0","journal-title":"ICGA 1989"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1007\/0-387-26350-0_5"}],"event":{"name":"2016 26th International Conference on Computer Theory and Applications (ICCTA)","start":{"date-parts":[[2016,10,25]]},"location":"Alexandria, Egypt","end":{"date-parts":[[2016,10,27]]}},"container-title":["2016 26th International Conference on Computer Theory and Applications (ICCTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9513217\/9512933\/09513230.pdf?arnumber=9513230","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,8]],"date-time":"2021-11-08T18:23:30Z","timestamp":1636395810000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9513230\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,25]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/iccta40200.2016.9513230","relation":{},"subject":[],"published":{"date-parts":[[2016,10,25]]}}}