{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:36:19Z","timestamp":1750307779336,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,11,2]],"date-time":"2007-11-02T00:00:00Z","timestamp":1193961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,11,2]]},"DOI":"10.1145\/1314418.1314433","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"90-98","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Security-by-contract for web services"],"prefix":"10.1145","author":[{"given":"Nicola","family":"Dragoni","sequence":"first","affiliation":[{"name":"Universit\u00e0 degli Studi di Trento, Trento, Italy"}]},{"given":"Fabio","family":"Massacci","sequence":"additional","affiliation":[{"name":"Universit\u00e0 degli Studi di Trento, Trento, Italy"}]}],"member":"320","published-online":{"date-parts":[[2007,11,2]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.5555\/876661.876667"},{"key":"e_1_3_2_1_2_1","volume-title":"Designing the mobile ipv6 security protocol. Annales des Telecommunications 61(3--4):332--356","author":"Aura T.","year":"2006","unstructured":"T. Aura and M. Roe . Designing the mobile ipv6 security protocol. Annales des Telecommunications 61(3--4):332--356 , 2006 . T. Aura and M. Roe. Designing the mobile ipv6 security protocol. Annales des Telecommunications 61(3--4):332--356, 2006."},{"key":"e_1_3_2_1_3_1","first-page":"164","volume-title":"Proc. of IEEE SS&P'96","author":"Blaze M.","year":"1996","unstructured":"M. Blaze , J. Feigenbaum , and J. Lacy . Decentralized trust management . In Proc. of IEEE SS&P'96 , pages 164 -- 173 . IEEE Press , 1996 . M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In Proc. of IEEE SS&P'96, pages 164--173. IEEE Press, 1996."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.3233\/JCS-2002-10303"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/507711.507732"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.5555\/646962.712108"},{"key":"e_1_3_2_1_7_1","first-page":"297","volume-title":"Proc. of EuroPKI'07","author":"Dragoni N.","year":"2007","unstructured":"N. Dragoni , F. Massacci , K. Naliuka , and I. Siahaan . Security-by-contract: Toward a semantics for digital signatures on mobile code . In Proc. of EuroPKI'07 , pages 297 -- 312 . Springer-Verlag , 2007 . N. Dragoni, F. Massacci, K. Naliuka, and I. Siahaan. Security-by-contract: Toward a semantics for digital signatures on mobile code. In Proc. of EuroPKI'07, pages 297--312. Springer-Verlag, 2007."},{"key":"e_1_3_2_1_8_1","first-page":"2693","author":"Ellison C.","year":"1999","unstructured":"C. Ellison , B. Frantz , B. Lampson , R. Rivest , B. M. Thomas , and T. Ylonen . SPKI Certificate Theory , September 1999 . IETF RFC 2693 . C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. M. Thomas, and T. Ylonen. SPKI Certificate Theory, September 1999. IETF RFC 2693.","journal-title":"SPKI Certificate Theory"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. of the Int. Workshop on Test and Analysis of Component Based Systems (TACoS 2004","volume":"82","author":"Heckel R.","year":"2004","unstructured":"R. Heckel and M. Lohmann . Towards contract-based testing of web services . In Proc. of the Int. Workshop on Test and Analysis of Component Based Systems (TACoS 2004 ), volume 82 of ENTCS. Elsevier Sci. , 2004 . R. Heckel and M. Lohmann. Towards contract-based testing of web services. In Proc. of the Int. Workshop on Test and Analysis of Component Based Systems (TACoS 2004), volume 82 of ENTCS. Elsevier Sci., 2004."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/968559.968562"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1007\/s10922-006-9057-2"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/1102120.1102129"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1023\/A:1025719407427"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1145\/1135777.1135818","volume-title":"Proc. of WWW'06","author":"Mecella M.","year":"2006","unstructured":"M. Mecella , M. Ouzzani , F. Paci , and E. Bertino . Access control enforcement for conversation-based web services . In Proc. of WWW'06 , pages 257 -- 266 . ACM Press , 2006 . 10.1145\/1135777.1135818 M. Mecella, M. Ouzzani, F. Paci, and E. Bertino. Access control enforcement for conversation-based web services. In Proc. of WWW'06, pages 257--266. ACM Press, 2006. 10.1145\/1135777.1135818"},{"key":"e_1_3_2_1_15_1","first-page":"201","volume-title":"Multiagent Systems","author":"Sandholm T.","year":"1999","unstructured":"T. Sandholm . Distributed rational decision making . In G. Weiss, editor, Multiagent Systems , pages 201 -- 259 . The MIT Press , Cambridge, Massachusetts , 1999 . T. Sandholm. Distributed rational decision making. In G. Weiss, editor, Multiagent Systems, pages 201--259. The MIT Press, Cambridge, Massachusetts, 1999."},{"key":"e_1_3_2_1_16_1","volume-title":"US Patent and Trademark Office","author":"Seamons K.","year":"2002","unstructured":"K. Seamons and W. Winsborough . Automated trust negotiation. Technical report , US Patent and Trademark Office , 2002 . IBM Corporation , patent application filed March 7, 2000. K. Seamons and W. Winsborough. Automated trust negotiation. Technical report, US Patent and Trademark Office, 2002. IBM Corporation, patent application filed March 7, 2000."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/945445.945448"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.5555\/645637.661149"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/605434.605435"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"acronym":"CCS07","name":"CCS07: 14th ACM Conference on Computer and Communications Security 2007","location":"Fairfax Virginia USA"},"container-title":["Proceedings of the 2007 ACM workshop on Secure web services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314418.1314433","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1314418.1314433","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:04Z","timestamp":1750254964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314418.1314433"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11,2]]},"references-count":19,"alternative-id":["10.1145\/1314418.1314433","10.1145\/1314418"],"URL":"https:\/\/doi.org\/10.1145\/1314418.1314433","relation":{},"subject":[],"published":{"date-parts":[[2007,11,2]]},"assertion":[{"value":"2007-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}