{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T15:00:13Z","timestamp":1758121213518,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,25]],"date-time":"2004-10-25T00:00:00Z","timestamp":1098662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,25]]},"DOI":"10.1145\/1030083.1030120","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"268-277","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["Verifying policy-based security for web services"],"prefix":"10.1145","author":[{"given":"Karthikeyan","family":"Bhargavan","sequence":"first","affiliation":[{"name":"Microsoft Research"}]},{"given":"C\u00e9dric","family":"Fournet","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Andrew D.","family":"Gordon","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]}],"member":"320","published-online":{"date-parts":[[2004,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/360204.360213"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/964001.964018"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30101-1_9"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/872752.873511"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/647171.716095"},{"key":"e_1_3_2_1_7_1","volume-title":"Aug.","author":"Box D.","year":"2004","unstructured":"D. Box , F. Curbera , Web Services Addressing (WS-Addressing) , Aug. 2004 . W3C Member Submission , at http: \/\/www.w3.org\/Submission\/ws-addressing\/.]] D. Box, F. Curbera, et al. Web Services Addressing (WS-Addressing), Aug. 2004. W3C Member Submission, at http: \/\/www.w3.org\/Submission\/ws-addressing\/.]]"},{"key":"e_1_3_2_1_8_1","volume-title":"May","author":"Box D.","year":"2003","unstructured":"D. Box , F. Curbera , M. Hondo , C. Kaler , D. Langworthy , A. Nadalin , N. Nagaratnam , M. Nottingham , C. von Riegen , and J. Shewchuk . Web services policy framework (WS-Policy) , May 2003 .]] D. Box, F. Curbera, M. Hondo, C. Kaler, D. Langworthy, A. Nadalin, N. Nagaratnam, M. Nottingham, C. von Riegen, and J. Shewchuk. Web services policy framework (WS-Policy), May 2003.]]"},{"key":"e_1_3_2_1_9_1","volume-title":"May","author":"Box D.","year":"2003","unstructured":"D. Box , M. Hondo , C. Kaler , H. Maruyama , A. Nadalin , N. Nagaratnam , P. Patrick , C. von Riegen , and J. Shewchuk . Web services policy assertions language (WS-PolicyAssertions) , May 2003 .]] D. Box, M. Hondo, C. Kaler, H. Maruyama, A. Nadalin, N. Nagaratnam, P. Patrick, C. von Riegen, and J. Shewchuk. Web services policy assertions language (WS-PolicyAssertions), May 2003.]]"},{"key":"e_1_3_2_1_10_1","volume-title":"Dec.","author":"Della-Libera G.","year":"2002","unstructured":"G. Della-Libera , P. Hallam-Baker , M. Hondo , T. Janczuk , C. Kaler , H. Maruyama , N. Nagaratnam , A. Nash , R. Philpott , H. Prafullchandra , J. Shewchuk , E. Waingold , and R. Zolfonoon . Web services security policy language (WS-SecurityPolicy) , Dec. 2002 .]] G. Della-Libera, P. Hallam-Baker, M. Hondo, T. Janczuk, C. Kaler, H. Maruyama, N. Nagaratnam, A. Nash, R. Philpott, H. Prafullchandra, J. Shewchuk, E. Waingold, and R. Zolfonoon. Web services security policy language (WS-SecurityPolicy), Dec. 2002.]]"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/764792.764797"},{"key":"e_1_3_2_1_13_1","unstructured":"J. D. Guttman and A. L. Herzog. Rigorous automated network security management. International Journal of Information Security. To appear.]]  J. D. Guttman and A. L. Herzog. Rigorous automated network security management. International Journal of Information Security. To appear.]]"},{"key":"e_1_3_2_1_14_1","volume-title":"Southern African Telecommunication Networks and Applications Conference (SATNAC)","author":"Lukell S.","year":"2003","unstructured":"S. Lukell , C. Veldman , and A. C. M. Hutchison . Automated attack analysis and code generation in a multi-dimensional security protocol engineering framework . In Southern African Telecommunication Networks and Applications Conference (SATNAC) , 2003 .]] S. Lukell, C. Veldman, and A. C. M. Hutchison. Automated attack analysis and code generation in a multi-dimensional security protocol engineering framework. In Southern African Telecommunication Networks and Applications Conference (SATNAC), 2003.]]"},{"key":"e_1_3_2_1_15_1","volume-title":"Web Services Enhancements (WSE) 2.0","author":"Microsoft Corporation","year":"2004","unstructured":"Microsoft Corporation . Web Services Enhancements (WSE) 2.0 , 2004 . At http:\/\/msdn.microsoft.com\/webservices\/building\/wse\/default.aspx.]] Microsoft Corporation. Web Services Enhancements (WSE) 2.0, 2004. At http:\/\/msdn.microsoft.com\/webservices\/building\/wse\/default.aspx.]]"},{"key":"e_1_3_2_1_17_1","volume-title":"OASIS Web Services Security: SOAP Message Security 1.0 (WS-Security","author":"Nadalin A.","year":"2004","unstructured":"A. Nadalin , C. Kaler , P. Hallam-Baker , and R. Monzillo . OASIS Web Services Security: SOAP Message Security 1.0 (WS-Security 2004 ), Mar. 2004. OASIS Standard 200401, at http:\/\/docs.oasis-open.org\/wss\/2004\/01\/oasis-200401-wss-soap-message-security-1.0.pdf.]] A. Nadalin, C. Kaler, P. Hallam-Baker, and R. Monzillo. OASIS Web Services Security: SOAP Message Security 1.0 (WS-Security 2004), Mar. 2004. OASIS Standard 200401, at http:\/\/docs.oasis-open.org\/wss\/2004\/01\/oasis-200401-wss-soap-message-security-1.0.pdf.]]"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/359657.359659"},{"key":"e_1_3_2_1_19_1","first-page":"241","volume-title":"13th Conference on Computer Aided Verification (CAV), LNCS","author":"Perrig A.","year":"2001","unstructured":"A. Perrig , D. Song , and D. Phan . AGVI - automatic generation, verification, and implementation of security protocols . In 13th Conference on Computer Aided Verification (CAV), LNCS , pages 241 -- 245 . Springer , 2001 .]] A. Perrig, D. Song, and D. Phan. AGVI - automatic generation, verification, and implementation of security protocols. In 13th Conference on Computer Aided Verification (CAV), LNCS, pages 241--245. Springer, 2001.]]"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/977394.977464"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1009386.1010163"},{"key":"e_1_3_2_1_22_1","volume-title":"XML Path Language (XPath) Version 1.0","author":"C.","year":"1999","unstructured":"W3 C. XML Path Language (XPath) Version 1.0 , 1999 . W3C Recommendation , at http:\/\/www.w3.org\/TR\/xpath.]] W3C. XML Path Language (XPath) Version 1.0, 1999. W3C Recommendation, at http:\/\/www.w3.org\/TR\/xpath.]]"},{"key":"e_1_3_2_1_23_1","unstructured":"W3C. SOAP Version 1.2 2003. W3C Recommendation at http:\/\/www.w3.org\/TR\/soap12.]]  W3C. SOAP Version 1.2 2003. W3C Recommendation at http:\/\/www.w3.org\/TR\/soap12.]]"},{"key":"e_1_3_2_1_24_1","first-page":"236","volume-title":"IEEE Computer Society Symposium on Research in Security and Privacy","author":"Zheng L.","year":"2003","unstructured":"L. Zheng , S. Chong , A. C. Myers , and S. Zdancewic . Using replication and partitioning to build secure distributed systems . In IEEE Computer Society Symposium on Research in Security and Privacy , pages 236 -- 250 , 2003 .]] L. Zheng, S. Chong, A. C. Myers, and S. Zdancewic. Using replication and partitioning to build secure distributed systems. In IEEE Computer Society Symposium on Research in Security and Privacy, pages 236--250, 2003.]]"}],"event":{"name":"CCS04: 11th ACM Conference on Computer and Communications Security 2004","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Washington DC USA","acronym":"CCS04"},"container-title":["Proceedings of the 11th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030120","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1030083.1030120","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:25:07Z","timestamp":1750263907000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030120"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10,25]]},"references-count":22,"alternative-id":["10.1145\/1030083.1030120","10.1145\/1030083"],"URL":"https:\/\/doi.org\/10.1145\/1030083.1030120","relation":{},"subject":[],"published":{"date-parts":[[2004,10,25]]},"assertion":[{"value":"2004-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}