{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T13:54:54Z","timestamp":1770818094813,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,11,11]],"date-time":"2005-11-11T00:00:00Z","timestamp":1131667200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,11,11]]},"DOI":"10.1145\/1103022.1103024","type":"proceedings-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T15:52:40Z","timestamp":1139241160000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["An advisor for web services security policies"],"prefix":"10.1145","author":[{"given":"Karthikeyan","family":"Bhargavan","sequence":"first","affiliation":[{"name":"Microsoft Research, Cambridge"}]},{"given":"C\u00e9dric","family":"Fournet","sequence":"additional","affiliation":[{"name":"Microsoft Research, Cambridge"}]},{"given":"Andrew D.","family":"Gordon","sequence":"additional","affiliation":[{"name":"Microsoft Research, Cambridge"}]},{"given":"Greg","family":"O'Shea","sequence":"additional","affiliation":[{"name":"Microsoft Research, Cambridge"}]}],"member":"320","published-online":{"date-parts":[[2005,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Symbolic and cryptographic analysis of the secure WS-Reliablessaging scenario. Unpublished draft","author":"Backes M.","year":"2005","unstructured":"M. Backes , B. Pfitzmann , S. M\u00f6dersheim , and L. Vigano . Symbolic and cryptographic analysis of the secure WS-Reliablessaging scenario. Unpublished draft , 2005 . M. Backes, B. Pfitzmann, S. M\u00f6dersheim, and L. Vigano. Symbolic and cryptographic analysis of the secure WS-Reliablessaging scenario. Unpublished draft, 2005."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111348.1111355"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030120"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2005.03.005"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30101-1_9"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/872752.873511"},{"key":"e_1_3_2_1_7_1","volume-title":"August","author":"Box D.","year":"2004","unstructured":"D. Box , F. Curbera , Web Services Addressing (WS-Addressing) , August 2004 . W3C Mber Submission , at http:\/\/www.w3.org\/Submission\/ws-addressing\/. D. Box, F. Curbera, et al. Web Services Addressing (WS-Addressing), August 2004. W3C Mber Submission, at http:\/\/www.w3.org\/Submission\/ws-addressing\/."},{"key":"e_1_3_2_1_8_1","volume-title":"May","author":"Box D.","year":"2003","unstructured":"D. Box , F. Curbera , M. Hondo , C. Kaler , D. Langworthy , A. Nadalin , N. Nagaratnam , M. Nottingham , C. von Riegen , and J. Shewchuk . Web services policy framework (WS-Policy) , May 2003 . Version 1.1. D. Box, F. Curbera, M. Hondo, C. Kaler, D. Langworthy, A. Nadalin, N. Nagaratnam, M. Nottingham, C. von Riegen, and J. Shewchuk. Web services policy framework (WS-Policy), May 2003. Version 1.1."},{"key":"e_1_3_2_1_9_1","volume-title":"May","author":"Box D.","year":"2003","unstructured":"D. Box , M. Hondo , C. Kaler , H. Maruyama , A. Nadalin , N. Nagaratnam , P. Patrick , C. von Riegen , and J. Shewchuk . Web services policy assertions language (WS-PolicyAssertions) , May 2003 . Version 1.1. D. Box, M. Hondo, C. Kaler, H. Maruyama, A. Nadalin, N. Nagaratnam, P. Patrick, C. von Riegen, and J. Shewchuk. Web services policy assertions language (WS-PolicyAssertions), May 2003. Version 1.1."},{"key":"e_1_3_2_1_10_1","volume-title":"July","author":"Della-Libera G.","year":"2005","unstructured":"G. Della-Libera , M. Gudgin , P. Hallam-Baker , M. Hondo , H. Granqvist , C. Kaler , H. Maruyama , M. McIntosh , A. Nadalin , N. Nagaratnam , R. Philpott , H. Prafullchandra , J. Shewchuk , D. Walter , and R. Zolfonoon . Web services security policy language (WS-SecurityPolicy) , July 2005 . Version 1.1. G. Della-Libera, M. Gudgin, P. Hallam-Baker, M. Hondo, H. Granqvist, C. Kaler, H. Maruyama, M. McIntosh, A. Nadalin, N. Nagaratnam, R. Philpott, H. Prafullchandra, J. Shewchuk, D. Walter, and R. Zolfonoon. Web services security policy language (WS-SecurityPolicy), July 2005. Version 1.1."},{"key":"e_1_3_2_1_11_1","volume-title":"Decber","author":"Della-Libera G.","year":"2002","unstructured":"G. Della-Libera , P.-Baker, M. Hondo , T. Janczuk , C. Kaler , H. Maruyama , A. Nadalin , N. Nagaratnam , A. Nash , R. Philpott , H. Prafullchandra , J. Shewchuk , E. Waingold , and R. Zolfonoon . Web services security policy language (WS-SecurityPolicy) , Decber 2002 . Version 1.0. G. Della-Libera, P.-Baker, M. Hondo, T. Janczuk, C. Kaler, H. Maruyama, A. Nadalin, N. Nagaratnam, A. Nash, R. Philpott, H. Prafullchandra, J. Shewchuk, E. Waingold, and R. Zolfonoon. Web services security policy language (WS-SecurityPolicy), Decber 2002. Version 1.0."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_1_13_1","volume-title":"XML-Signature Syntax and Processing","author":"Eastlake D.","year":"2002","unstructured":"D. Eastlake , J. Reagle , D. Solo , M. Bartel , J. Boyer , B. Fox , B. LaMacchia , and E. Simon . XML-Signature Syntax and Processing , 2002 . W3C Recommendation , at http:\/\/www.w3.org\/TR\/2002\/REC-xmldsig-core-20020212\/. D. Eastlake, J. Reagle, D. Solo, M. Bartel, J. Boyer, B. Fox, B. LaMacchia, and E. Simon. XML-Signature Syntax and Processing, 2002. W3C Recommendation, at http:\/\/www.w3.org\/TR\/2002\/REC-xmldsig-core-20020212\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Foundstone. WSDigger July 2005. A t www.foundstone.com\/resources\/proddesc\/wsdigger.htm.  Foundstone. WSDigger July 2005. A t www.foundstone.com\/resources\/proddesc\/wsdigger.htm."},{"key":"e_1_3_2_1_15_1","volume-title":"Language workbenches: The killer-app for domain specific languages?","author":"Fowler M.","year":"2005","unstructured":"M. Fowler . Language workbenches: The killer-app for domain specific languages? , 2005 . At http:\/\/www.martinfowler.com\/articles\/languageWorkbench.html. M. Fowler. Language workbenches: The killer-app for domain specific languages?, 2005. At http:\/\/www.martinfowler.com\/articles\/languageWorkbench.html."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/764792.764797"},{"key":"e_1_3_2_1_17_1","volume-title":"Microsoft WS--I Basic Security Profile 1.0 Sample Application","author":"Hogg J.","year":"2005","unstructured":"J. Hogg , H. de Lahitte , D. Gonzalez , P. Cibraro , P. Coupland , M. Bhao , and P. Slater . Microsoft WS--I Basic Security Profile 1.0 Sample Application . Microsoft Corporation , June 2005 . Preview release for the .NET Framework version 1.1. J. Hogg, H. de Lahitte, D. Gonzalez, P. Cibraro, P. Coupland, M. Bhao, and P. Slater. Microsoft WS--I Basic Security Profile 1.0 Sample Application. Microsoft Corporation, June 2005. Preview release for the .NET Framework version 1.1."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of Automated Reasoning for Security Protocol Analysis (ARSPA 04)","author":"Kleiner E.","year":"2004","unstructured":"E. Kleiner and A. W. Roscoe . Web services security: A preliminary study using Casper and FDR . In Proceedings of Automated Reasoning for Security Protocol Analysis (ARSPA 04) , 2004 . E. Kleiner and A. W. Roscoe. Web services security: A preliminary study using Casper and FDR. In Proceedings of Automated Reasoning for Security Protocol Analysis (ARSPA 04), 2004."},{"key":"e_1_3_2_1_19_1","volume-title":"Web Services Enhancents (WSE) 2.0","author":"Microsoft Corporation","year":"2004","unstructured":"Microsoft Corporation . Web Services Enhancents (WSE) 2.0 , 2004 . At http:\/\/msdn.microsoft.com\/webservices\/building\/wse\/default.aspx. Microsoft Corporation. Web Services Enhancents (WSE) 2.0, 2004. At http:\/\/msdn.microsoft.com\/webservices\/building\/wse\/default.aspx."},{"key":"e_1_3_2_1_20_1","volume-title":"OASIS Web Services Security: SOAP Message Security 1.0 (WS-Security","author":"Nadalin A.","year":"2004","unstructured":"A. Nadalin , C. Kaler , P. Hallam-Baker , and R. Monzillo . OASIS Web Services Security: SOAP Message Security 1.0 (WS-Security 2004 ), March 2004. OASIS Standard 200401, at http:\/\/docs.oasis-open.org\/wss\/2004\/01\/oasis-200401-wss-soap-message-security-1.0.pdf. A. Nadalin, C. Kaler, P. Hallam-Baker, and R. Monzillo. OASIS Web Services Security: SOAP Message Security 1.0 (WS-Security 2004), March 2004. OASIS Standard 200401, at http:\/\/docs.oasis-open.org\/wss\/2004\/01\/oasis-200401-wss-soap-message-security-1.0.pdf."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/359657.359659"},{"key":"e_1_3_2_1_22_1","volume-title":"March","author":"O'Neill M.","year":"2005","unstructured":"M. O'Neill . Mapping security to a services oriented architecture , March 2005 . CASSIS '05 presentation, at http:\/\/wwwsop.inria.fr\/everest\/events\/cassis05\/Transp\/oneill.ppt. M. O'Neill. Mapping security to a services oriented architecture, March 2005. CASSIS'05 presentation, at http:\/\/wwwsop.inria.fr\/everest\/events\/cassis05\/Transp\/oneill.ppt."},{"key":"e_1_3_2_1_23_1","volume-title":"Hacking Web Applications Exposed","author":"Scambray J.","year":"2002","unstructured":"J. Scambray and M. Sha . Hacking Web Applications Exposed . McGraw-Hill\/Osborne , 2002 . J. Scambray and M. Sha. Hacking Web Applications Exposed. McGraw-Hill\/Osborne, 2002."},{"key":"e_1_3_2_1_24_1","volume-title":"Threat Modeling","author":"Swiderski F.","year":"2004","unstructured":"F. Swiderski and W. Snyder . Threat Modeling . Microsoft Press , 2004 . F. Swiderski and W. Snyder. Threat Modeling. Microsoft Press, 2004."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1009386.1010163"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/11549970_16"},{"key":"e_1_3_2_1_27_1","volume-title":"Threat modeling","author":"Udell J.","year":"2004","unstructured":"J. Udell . Threat modeling , 2004 . At http:\/\/weblog.infoworld.com\/udell\/2004\/05\/25.html. J. Udell. Threat modeling, 2004. At http:\/\/weblog.infoworld.com\/udell\/2004\/05\/25.html."},{"key":"e_1_3_2_1_28_1","unstructured":"W3C. SOAP Version 1.2 2003. W3C Recommendation at http:\/\/www.w3.org\/TR\/soap12.  W3C. SOAP Version 1.2 2003. W3C Recommendation at http:\/\/www.w3.org\/TR\/soap12."},{"key":"e_1_3_2_1_29_1","volume-title":"A Guide to Building Secure Web Applications and Web Services. OWASP, 2.0 Black Hat edition","author":"Wiesmann A.","year":"2005","unstructured":"A. Wiesmann , M. Curphey , A. van der Stock , and R. Stirbei , editors . A Guide to Building Secure Web Applications and Web Services. OWASP, 2.0 Black Hat edition , 2005 . At http:\/\/www.owasp.org. A. Wiesmann, M. Curphey, A. van der Stock, and R. Stirbei, editors. A Guide to Building Secure Web Applications and Web Services. OWASP, 2.0 Black Hat edition, 2005. At http:\/\/www.owasp.org."}],"event":{"name":"CCS05: 12th ACM Conference on Computer and Communications Security 2005","location":"Fairfax VA USA","acronym":"CCS05","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2005 workshop on Secure web services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1103022.1103024","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1103022.1103024","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:43:24Z","timestamp":1750286604000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1103022.1103024"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,11,11]]},"references-count":29,"alternative-id":["10.1145\/1103022.1103024","10.1145\/1103022"],"URL":"https:\/\/doi.org\/10.1145\/1103022.1103024","relation":{},"subject":[],"published":{"date-parts":[[2005,11,11]]},"assertion":[{"value":"2005-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}