{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:02:30Z","timestamp":1729652550963,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,8]]},"DOI":"10.1109\/isias.2010.5604183","type":"proceedings-article","created":{"date-parts":[[2010,10,19]],"date-time":"2010-10-19T14:59:49Z","timestamp":1287500389000},"page":"137-142","source":"Crossref","is-referenced-by-count":2,"title":["End-to-end security policy description and management for collaborative system"],"prefix":"10.1109","author":[{"given":"Ziyi","family":"Su","sequence":"first","affiliation":[]},{"given":"Frederique","family":"Biennier","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Distributed Service Platform","year":"0","key":"ref33"},{"journal-title":"SOA Governance solution","year":"0","key":"ref32"},{"key":"ref31","article-title":"Trust Metrics, Models and protocols for electronic commerce transactions","author":"manchala","year":"1998","journal-title":"Proc the 18th International Conference on Distributed Computing Systems (ICDCS 1998)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"article-title":"Enforcement for usage control-an overview of control mechanisms","year":"2006","author":"hilty","key":"ref10"},{"year":"0","key":"ref11","article-title":"INTERNATIONAL STANDARD ISO\/IEC 27002: 2005(E): Information technology &#x2014; Security techniques &#x2014; Code of practice for information security management"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05290-3_62"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1456396.1456402"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377856"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1179601.1179609"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1551722.1551747"},{"article-title":"IT security and risk management: ISO 17799","year":"0","author":"nurguzhina","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1370905.1370910"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367607"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2003.1206966"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2005.01.004"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02056-8_18"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8139-1_11"},{"year":"0","key":"ref6","article-title":"Web services security: SOAP Message Security 1.1"},{"key":"ref29","first-page":"207","article-title":"Security integration in inter-enterprise business process engineering","author":"biennier","year":"2002","journal-title":"Collaborative Systems for Production Management"},{"key":"ref5","first-page":"304","article-title":"Integration of the information cycle of life in concurrent engineering","author":"biennier","year":"0","journal-title":"Advances in Concurrent Engineering CE 96 Collaborative Work Organization and Management Presented at Third ISPE International Conference on Concurrent Engineering Research and Applications"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1518684.1518689"},{"key":"ref7","article-title":"Architectural refinement for the design of survivable systems","author":"ellison","year":"2001","journal-title":"Technical Note (CMU\/SEI-2001-TN-008) Software Engineering Institute"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45113-7","article-title":"Digital rights management, technological, economic, legal and political aspects","volume":"2770","author":"becker","year":"2003","journal-title":"Springer Lecture Notes in Computer Science"},{"key":"ref9","first-page":"531","article-title":"A policy language for distributed usage control","volume":"4734 2008","author":"hilty","year":"2008","journal-title":"Computer Security&#x2014;ESORICS 2007"},{"article-title":"Introduction to the OCTAVE&#x00AE; Approach","year":"2003","author":"alberts","key":"ref1"},{"year":"0","key":"ref20","article-title":"Trusted Platform Module (TPM) Specification"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344301"},{"year":"0","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1029133.1029140"},{"journal-title":"The EBIOS&#x00AE; guides","year":"0","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1330295.1330298"},{"year":"0","key":"ref25"}],"event":{"name":"2010 Sixth International Conference on Information Assurance and Security (IAS)","start":{"date-parts":[[2010,8,23]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2010,8,25]]}},"container-title":["2010 Sixth International Conference on Information Assurance and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5594714\/5604038\/05604183.pdf?arnumber=5604183","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T12:25:32Z","timestamp":1559737532000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5604183\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/isias.2010.5604183","relation":{},"subject":[],"published":{"date-parts":[[2010,8]]}}}