{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:11:40Z","timestamp":1729631500210,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1109\/ssic.2016.7571813","type":"proceedings-article","created":{"date-parts":[[2016,9,22]],"date-time":"2016-09-22T21:19:12Z","timestamp":1474579152000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Securing tactical service oriented architectures"],"prefix":"10.1109","author":[{"given":"Vasileios","family":"Gkioulos","sequence":"first","affiliation":[]},{"given":"Stephen D.","family":"Wolthusen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1645406.1645408"},{"year":"2014","key":"ref11","article-title":"IST-090 Task Group"},{"year":"0","key":"ref12","article-title":"IST-118 Task Group"},{"key":"ref13","article-title":"A survey of policy specification approaches","author":"damianou","year":"2002","journal-title":"Tech Rep"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/65.993218"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/65.898818"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/978-3-642-31875-7_13","article-title":"Semantic matching of ws-securitypolicy assertions","volume":"7221","author":"ben","year":"2012","journal-title":"Service-Oriented Computing - ICSOC 2011 Workshops"},{"year":"2015","key":"ref17","article-title":"NATO Consultation, Command and Control Board Board (NC3B)"},{"key":"ref18","article-title":"TACTICS: tactical service oriented architecture","volume":"abs 1504 7578","author":"aloisio","year":"2015","journal-title":"CoRR"},{"key":"ref19","article-title":"Enabling Dynamic Security Policy Evaluation for Service-Oriented Architectures in Tactical Networks","author":"gkioulos","year":"2015","journal-title":"proceedings of the Norwegian Information Security Conference NISK 2015"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.21236\/ADA457293","author":"smith","year":"2006","journal-title":"Complexity Networking and Effects-Based Approaches to Operations"},{"journal-title":"Power to the Edge","year":"2003","author":"alberts","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5594677"},{"article-title":"Maneuver warfare science 2001","year":"2001","author":"horne","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2007.4342822"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2003.819809"},{"journal-title":"Adapting Modeling & Simulation for Network Enabled Operations","year":"2011","author":"moffat","key":"ref2"},{"year":"2014","key":"ref1","article-title":"NATO Network Enabled Capability (NNEC)"},{"key":"ref9","first-page":"1","article-title":"Soa over disadvantaged grids experiment and demonstrator","author":"johnsen","year":"2012","journal-title":"Communications and Information Systems Conference (MCC) 2012 Military"},{"key":"ref20","article-title":"Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures","author":"gkioulos","year":"2015","journal-title":"Advances in Networking Systems Architectures Security and Applications - of Springer's Advances in Intelligent Systems and Computing"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/SOSE.2006.32","article-title":"Semantic descriptions of web services security constraints","author":"huang","year":"2006","journal-title":"Service-Oriented System Engineering 2006 SOSE '06 Second IEEE International Workshop"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-48021-3_4","article-title":"Reconciliation of Ontologically Defined Security Policies for Tactical Service Oriented Architectures","author":"gkioulos","year":"2016","journal-title":"Submitted for review at International Conference on Future Network Systems and Security-FNSS"},{"journal-title":"Computer Security Handbook","year":"2002","author":"bosworth","key":"ref24"},{"journal-title":"Tech Rep","article-title":"HMG IA Standard No. 1: Technical Risk Assessment (Issue 3.51), CESG, UK, 2009","year":"0","key":"ref23"}],"event":{"name":"2016 International Conference on Security of Smart cities, Industrial Control System and Communications (SSIC)","start":{"date-parts":[[2016,7,18]]},"location":"Paris, France","end":{"date-parts":[[2016,7,19]]}},"container-title":["2016 International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7565236\/7571793\/07571813.pdf?arnumber=7571813","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T22:35:15Z","timestamp":1568414115000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7571813\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/ssic.2016.7571813","relation":{},"subject":[],"published":{"date-parts":[[2016,7]]}}}