{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T00:02:28Z","timestamp":1773792148478,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,4]]},"DOI":"10.1109\/icdew.2007.4401056","type":"proceedings-article","created":{"date-parts":[[2007,12,18]],"date-time":"2007-12-18T14:56:26Z","timestamp":1197989786000},"page":"685-694","source":"Crossref","is-referenced-by-count":7,"title":["Security Policy Enforcement in BPEL-Defined Collaborative Business Processes"],"prefix":"10.1109","author":[{"given":"Klaus-Peter","family":"Fischer","sequence":"first","affiliation":[]},{"given":"Udo","family":"Bleimann","sequence":"additional","affiliation":[]},{"given":"Woldemar","family":"Fuhrmann","sequence":"additional","affiliation":[]},{"given":"Steven M.","family":"Furnell","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","article-title":"Architectural Patterns for Enabling Application Security","author":"yoder","year":"1997","journal-title":"Proc 4th Conference on Patterns Language of Programming (PLoP'97)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/762476.762481"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2004.02.001"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"ref11","first-page":"207","article-title":"A Security Infrastructure for Cross-Domain Deployment of Script-Based Business Processes in SOC Environments","author":"fischer","year":"2005","journal-title":"Proc 5th International Network Conference INC'2005"},{"key":"ref12","first-page":"203","article-title":"Security-Relevant Semantic Patterns of BPEL in Cross-Organisational Business Processes","author":"fischer","year":"2006","journal-title":"Proc 6th International Network Conference INC'2006"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1982.10014"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/359205.359224"},{"key":"ref15","author":"kiric","year":"2006","journal-title":"Sicherheit und Gesch&#x00E4;ftsprozesse"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/968559.968562"},{"key":"ref17","first-page":"158","article-title":"Downgrading Policies and Relaxed Noninterference","author":"li","year":"2005","journal-title":"Proceedings of the ACM Symposium on Principles of Programming Languages"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1145718.1145723"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/s00778-003-0087-z","article-title":"Business-to-business interactions: issues and enabling technologies","volume":"12","author":"medjahed","year":"2003","journal-title":"VLDB Journal"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/844102.844113"},{"key":"ref4","article-title":"XML Path Language (XPath) 2.0","author":"berglund","year":"2006","journal-title":"World Wide Web Consortium"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.31"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581276"},{"key":"ref6","article-title":"Web Services Description Language (WSDL) 2.0 Part 1: Core Language","author":"chinnici","year":"2006","journal-title":"World Wide Web Consortium"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/325694.325728"},{"key":"ref5","article-title":"XML Schema Part 2: Datatypes Second Edition","author":"biron","year":"2004","journal-title":"World Wide Web Consortium"},{"key":"ref8","first-page":"153","article-title":"Security Policy in a Declarative Style","author":"echahed","year":"2005","journal-title":"Proc 7th ACM SIGPLAN international conference on Principles and practice of declarative programming PPDP'05"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/990036.990062"},{"key":"ref2","article-title":"Web Services Business Process Execution Language Version 2.0","author":"arkin","year":"2004","journal-title":"OASIS"},{"key":"ref9","article-title":"XML Schema Part 0: Primer 2nd Edition","author":"fallside","year":"2004","journal-title":"World Wide Web Consortium"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775429"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ENABL.2004.9"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/WI.2004.10081"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945448"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/353323.353382"},{"key":"ref26","article-title":"Open Grid Services Infrastructure (OGSI) Version 1.0","author":"tuecke","year":"2003","journal-title":"Global Grid Forum"},{"key":"ref25","article-title":"XML Schema Part 1: Structures Second Edition","author":"thompson","year":"2004","journal-title":"World Wide Web Consortium"}],"event":{"name":"2007 IEEE 23rd International Conference on Data Engineering Workshop","location":"Istanbul, Turkey","start":{"date-parts":[[2007,4,17]]},"end":{"date-parts":[[2007,4,20]]}},"container-title":["2007 IEEE 23rd International Conference on Data Engineering Workshop"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4400942\/4400943\/04401056.pdf?arnumber=4401056","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T22:17:23Z","timestamp":1497737843000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4401056\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,4]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icdew.2007.4401056","relation":{},"subject":[],"published":{"date-parts":[[2007,4]]}}}