{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:14:06Z","timestamp":1759133646543,"version":"3.37.3"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"EU F7 project ASSERT4SOA","award":["257351"],"award-info":[{"award-number":["257351"]}]},{"name":"H2020 project CYBERSURE","award":["734815"],"award-info":[{"award-number":["734815"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2020,5,1]]},"DOI":"10.1109\/tsc.2017.2690430","type":"journal-article","created":{"date-parts":[[2017,4,3]],"date-time":"2017-04-03T19:48:23Z","timestamp":1491248903000},"page":"515-528","source":"Crossref","is-referenced-by-count":10,"title":["Pattern-Based Design and Verification of Secure Service Compositions"],"prefix":"10.1109","volume":"13","author":[{"given":"Luca","family":"Pino","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0037-2600","authenticated-orcid":false,"given":"George","family":"Spanoudakis","sequence":"additional","affiliation":[]},{"given":"Maria","family":"Krotsiani","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2112-2061","authenticated-orcid":false,"given":"Khaled","family":"Mahbub","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10383-4_27"},{"year":"0","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2012.3"},{"key":"ref30","first-page":"1","article-title":"Designing secure business processes with secBPMN","author":"salnitri","year":"2015","journal-title":"Softw Syst Model"},{"year":"1999","key":"ref36","article-title":"Terminology and Glossary"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.84"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601322"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jeconom.2003.10.024"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(82)90020-0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-73655-6_28"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2005.01.004"},{"year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/11839569_31"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S1574-6526(07)03016-7"},{"key":"ref17","first-page":"1","article-title":"Automation of service-based security-aware business processes in the Cloud","volume":"98","author":"lins","year":"2015","journal-title":"Comput"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2000.892332"},{"key":"ref19","article-title":"OWL-S: Semantic markup for web services","volume":"22","author":"martin","year":"2004","journal-title":"W3C Member Submission"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-25414-2_6","article-title":"Generating secure service compositions","author":"pino","year":"2015","journal-title":"Communications in Computer and Information Science"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2005.126"},{"article-title":"ASSERTS aware Service Orchestration Patterns, Deliverable D2.2","year":"2012","author":"pino","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13518-2_10"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1035167.1035185"},{"year":"0","key":"ref29"},{"article-title":"Web services description language (wsdl) version 2.0 part 1: Core language","year":"2007","author":"chinnici","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.10.001"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.02.006"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.31"},{"year":"0","key":"ref9","article-title":"Drools"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2013.11"},{"year":"2011","author":"mahbub","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27834-4_60"},{"journal-title":"Communication and Concurrency","year":"1989","author":"milner","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2012.61"},{"article-title":"Security Aware Service Composition","year":"2015","author":"pino","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45391-9_48"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2012.6208741"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4629386\/9114375\/07891550.pdf?arnumber=7891550","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:12:11Z","timestamp":1651079531000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7891550\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,1]]},"references-count":36,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2017.2690430","relation":{},"ISSN":["1939-1374","2372-0204"],"issn-type":[{"type":"electronic","value":"1939-1374"},{"type":"electronic","value":"2372-0204"}],"subject":[],"published":{"date-parts":[[2020,5,1]]}}}