{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:21:11Z","timestamp":1742383271617},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,11,3]]},"DOI":"10.1145\/1180337.1180342","type":"proceedings-article","created":{"date-parts":[[2007,1,17]],"date-time":"2007-01-17T01:15:56Z","timestamp":1168996556000},"page":"45-54","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Defeasible security policy composition for web services"],"prefix":"10.1145","author":[{"given":"Adam J.","family":"Lee","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jodie P.","family":"Boyer","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lars E.","family":"Olson","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Carl A.","family":"Gunter","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2006,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354680"},{"key":"e_1_3_2_1_2_1","unstructured":"Amazon web services. Web Page Jan. 2006. www.amazon.com\/gp\/aws\/landing.html.  Amazon web services. Web Page Jan. 2006. www.amazon.com\/gp\/aws\/landing.html."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/874072.876184"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/874072.876185"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0743-1066(99)00060-6"},{"key":"e_1_3_2_1_6_1","volume-title":"Specification","author":"Batres S.","year":"2005","unstructured":"S. Batres and C. Ferris (Editors). Web services reliable messaging policy assertion(WS-RM Policy) . Specification , Feb. 2005 . msdn.microsoft.com\/library\/en-us\/dnglobspec\/html\/WS-RMPolicy.pdf. S. Batres and C. Ferris (Editors). Web services reliable messaging policy assertion(WS-RM Policy). Specification, Feb. 2005. msdn.microsoft.com\/library\/en-us\/dnglobspec\/html\/WS-RMPolicy.pdf."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1947337.1947353"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030120"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.32"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/646647.699335"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352623"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/882493.884372"},{"key":"e_1_3_2_1_13_1","first-page":"w3","article-title":"XML-DSig working group","author":"Eastlake D.","year":"2006","unstructured":"D. Eastlake and J. Reagle(Chairs). W3C XML-DSig working group . Web Page , Jan. 2006 . www. w3 .org\/Signature\/. D. Eastlake and J. Reagle(Chairs). W3C XML-DSig working group. Web Page, Jan. 2006. www.w3.org\/Signature\/.","journal-title":"Web Page"},{"key":"e_1_3_2_1_14_1","volume-title":"Specification","author":"Web","year":"2005","unstructured":"Web services reliable messaging protocol(WS-R eliable M essaging) . Specification , Feb. 2005 . msdn.microsoft.com\/library\/en-us\/dnglobspec\/html\/WS-ReliableMessaging.p%df. Web services reliable messaging protocol(WS-R eliable M essaging). Specification, Feb. 2005. msdn.microsoft.com\/library\/en-us\/dnglobspec\/html\/WS-ReliableMessaging.p%df."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1009167"},{"key":"e_1_3_2_1_16_1","volume-title":"The Encyclopedia of Language and Linguistics","author":"Frankish K.","year":"2005","unstructured":"K. Frankish . Non-monotonic inference . In The Encyclopedia of Language and Linguistics . Elsevier , second edition, 2005 . K. Frankish. Non-monotonic inference. In The Encyclopedia of Language and Linguistics. Elsevier, second edition, 2005."},{"key":"e_1_3_2_1_17_1","unstructured":"Google web APIs. Web Page Jan. 2006. www.google.com\/apis\/.  Google web APIs. Web Page Jan. 2006. www.google.com\/apis\/."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of CollECTeR","author":"Governatori G.","year":"2000","unstructured":"G. Governatori , A. H. M. ter Hofstede , and P. Oaks . Defeasible logic for automated negotiation. In P. Swatman and P. M. Swatman, editors , Proceedings of CollECTeR , 2000 . G. Governatori, A. H. M. ter Hofstede, and P. Oaks. Defeasible logic for automated negotiation. In P. Swatman and P. M. Swatman, editors, Proceedings of CollECTeR, 2000."},{"key":"e_1_3_2_1_19_1","first-page":"47","volume-title":"Proceedings of the 2nd Australasian Workshop on Computational Logic","author":"Governatori G.","year":"2001","unstructured":"G. Governatori , A. H. M. ter Hofstede , and P. Oaks . Is defeasible logic applicable? In G. Antoniou and G. Governatori, editors , Proceedings of the 2nd Australasian Workshop on Computational Logic , pages 47 -- 62 , Brisbane January 2001 . Queensland University of Technology. G. Governatori, A. H. M. ter Hofstede, and P. Oaks. Is defeasible logic applicable? In G. Antoniou and G. Governatori, editors, Proceedings of the 2nd Australasian Workshop on Computational Logic, pages 47--62, Brisbane January 2001. Queensland University of Technology."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/336992.337010"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2003.1212713"},{"key":"e_1_3_2_1_22_1","volume-title":"Web Page","author":"Horrell S.","year":"2004","unstructured":"S. Horrell . Web services enhancements 2.0 support for WS-P olicy . Web Page , July 2004 . msdn.microsoft.com\/library\/en-us\/dnwse\/html\/wse2wspolicy.asp. S. Horrell. Web services enhancements 2.0 support for WS-P olicy. Web Page, July 2004. msdn.microsoft.com\/library\/en-us\/dnwse\/html\/wse2wspolicy.asp."},{"key":"e_1_3_2_1_23_1","first-page":"106","article-title":"Web services federation language (WS-F ederation)","author":"Kaler C.","year":"2003","unstructured":"C. Kaler and A. Nadalin (Editors) . Web services federation language (WS-F ederation) . Specification , Jul. 2003 . www- 106 .ibm.com\/developerworks\/webservices\/library\/ws-fed\/. C. Kaler and A. Nadalin (Editors). Web services federation language (WS-F ederation). Specification, Jul. 2003. www-106.ibm.com\/developerworks\/webservices\/library\/ws-fed\/.","journal-title":"Specification"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.824414"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2005.138"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1017\/S1471068401001168"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180337.1180338"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1017753.1017789"},{"key":"e_1_3_2_1_30_1","volume-title":"Web Services Specification","author":"A. Nadalin","year":"2002","unstructured":"A. Nadalin (Editor). Web services security policy language (WS-SecurityPolicy) . Web Services Specification , 2002 . www.verisign.com\/wss\/WS-SecurityPolicy.pdf. A. Nadalin (Editor). Web services security policy language (WS-SecurityPolicy). Web Services Specification, 2002. www.verisign.com\/wss\/WS-SecurityPolicy.pdf."},{"key":"e_1_3_2_1_31_1","volume-title":"14th International Conference on Applications of Prolog","author":"Nute D.","year":"2001","unstructured":"D. Nute . Defeasible logic . In 14th International Conference on Applications of Prolog , Oct. 2001 . D. Nute. Defeasible logic. In 14th International Conference on Applications of Prolog, Oct. 2001."},{"key":"e_1_3_2_1_32_1","first-page":"w3","article-title":"XML encryption working group","author":"J. Reagle","year":"2006","unstructured":"J. Reagle (Chair). W3C XML encryption working group . Web Page , Jan. 2006 . www. w3 .org\/Encryption\/2001\/. J. Reagle (Chair). W3C XML encryption working group. Web Page, Jan. 2006. www.w3.org\/Encryption\/2001\/.","journal-title":"Web Page"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/375735.375867"},{"key":"e_1_3_2_1_34_1","volume-title":"A query answering defeasible logic system. Technical report","author":"Rock A.","year":"2004","unstructured":"A. Rock . Deimos : A query answering defeasible logic system. Technical report , Griffith University , Mar. 2004 www.cit.gu.edu.au\/~arock\/defeasible\/doc\/Deimos-long.pdf. A. Rock. Deimos: A query answering defeasible logic system. Technical report, Griffith University, Mar. 2004 www.cit.gu.edu.au\/~arock\/defeasible\/doc\/Deimos-long.pdf."},{"key":"e_1_3_2_1_35_1","volume-title":"Web Services Specification","author":"J. Schlimmer","year":"2004","unstructured":"J. Schlimmer (Editor). Web services policy framework (WS-Policy) . Web Services Specification , 2004 . ftp:\/\/www6.software.ibm.com\/software\/developer\/library\/ws-policy.pdf. J. Schlimmer (Editor). Web services policy framework (WS-Policy). Web Services Specification, 2004. ftp:\/\/www6.software.ibm.com\/software\/developer\/library\/ws-policy.pdf."},{"key":"e_1_3_2_1_36_1","volume-title":"Specification","author":"C. Sharp","year":"2004","unstructured":"C. Sharp (Editor). Web services policy attachment (WS-P olicy A ttachment) . Specification , Sept. 2004 . msdn.microsoft.com\/library\/en us\/dnglobspec\/html\/ws-policyattachment.as%p. C. Sharp (Editor). Web services policy attachment (WS-P olicy A ttachment). Specification, Sept. 2004. msdn.microsoft.com\/library\/en us\/dnglobspec\/html\/ws-policyattachment.as%p."},{"key":"e_1_3_2_1_37_1","unstructured":"SOAP version 1.2. W3C Recommendation Jan. 2006. www.w3.org\/TR\/soap12.  SOAP version 1.2. W3C Recommendation Jan. 2006. www.w3.org\/TR\/soap12."}],"event":{"name":"CCS06: 13th ACM Conference on Computer and Communications Security 2006","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS06"},"container-title":["Proceedings of the fourth ACM workshop on Formal methods in security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1180337.1180342","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T00:48:56Z","timestamp":1673311736000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1180337.1180342"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,11,3]]},"references-count":36,"alternative-id":["10.1145\/1180337.1180342","10.1145\/1180337"],"URL":"https:\/\/doi.org\/10.1145\/1180337.1180342","relation":{},"subject":[],"published":{"date-parts":[[2006,11,3]]},"assertion":[{"value":"2006-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}