{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:17:18Z","timestamp":1771658238699,"version":"3.50.1"},"reference-count":28,"publisher":"Zhejiang University Press","issue":"5","license":[{"start":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T00:00:00Z","timestamp":1525132800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61562087"],"award-info":[{"award-number":["61562087"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772270"],"award-info":[{"award-number":["61772270"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the National High-Tech R&D Program (863) of China","award":["2015AA015303"],"award-info":[{"award-number":["2015AA015303"]}]},{"name":"the Natural Science Foundation of Jiangsu Province, China","award":["BK20130735"],"award-info":[{"award-number":["BK20130735"]}]},{"name":"the Universities Natural Science Foundation of Jiangsu Province, China","award":["13KJB520011"],"award-info":[{"award-number":["13KJB520011"]}]},{"name":"the Science Foundation of Nanjing Institute of Technology, China","award":["YKJ201420"],"award-info":[{"award-number":["YKJ201420"]}]}],"content-domain":{"domain":["springerlink.com","jzus.zju.edu.cn"],"crossmark-restriction":true},"short-container-title":["Frontiers Inf Technol Electronic Eng"],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1631\/fitee.1700359","type":"journal-article","created":{"date-parts":[[2018,7,16]],"date-time":"2018-07-16T03:53:11Z","timestamp":1531713191000},"page":"626-638","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Preserving privacy information flow security in composite service evolution"],"prefix":"10.1631","volume":"19","author":[{"given":"Huan-feng","family":"Peng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6843-1892","authenticated-orcid":false,"given":"Zhi-qiu","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Lin-yuan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Da-juan","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Yu-qing","family":"Wang","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2018,7,16]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2013.12.006"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2015.06.003"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2011.22"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2013.122313.130423"},{"key":"ref5","volume-title":"Secure computer systems: mathematical foundations. Technical Report, No. 2547","author":"Bell","year":"1973"},{"key":"ref6","volume-title":"Computer Security: Art and Science","author":"Bishop","year":"2002"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/icws.2011.114"},{"key":"ref9","first-page":"613","article-title":"Multilevel security and information flow in Petri net workflows","volume-title":"9th Int Conf on Telecommunication Systems","author":"Knorr","year":"2001"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/tsc.2016.2617331"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/access.2016.2597061"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.09.128"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/11841760_3"},{"key":"ref14","article-title":"Static analysis method of secure privacy information flow for service composition","author":"Peng","year":"2017","journal-title":"J Softw"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/apsec.2012.30"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/icws.2011.35"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/scc.2010.24"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/tase.2008.916747"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-63139-9_48"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/icws.2009.62"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/wi-iat.2011.196"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11761-013-0128-4"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11761-011-0093-8"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.12.009"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/tsmc.2013.2248358"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/tase.2014.2362819"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/scc.2010.19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2016.03.002"}],"container-title":["Frontiers of Information Technology &amp; Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1700359.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1631\/FITEE.1700359\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1700359.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T06:55:29Z","timestamp":1771656929000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1631\/FITEE.1700359"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":28,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,5]]}},"alternative-id":["1256"],"URL":"https:\/\/doi.org\/10.1631\/fitee.1700359","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5]]},"assertion":[{"value":"http:\/\/orcid.org\/0000-0001-6843-1892","URL":"http","order":0,"name":"name","label":"Zhi-qiu HUANG","group":{"name":"orcid","label":"ORCID"}},{"value":"2017-06-06","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-12-03","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-05-10","order":2,"name":"crosschecked","label":"Crosschecked","group":{"name":"publication_history","label":"Publication History"}},{"value":"Article","order":0,"name":"content_type","group":{"name":"content_type","label":"Content Type"}},{"value":"\u00a9 Zhejiang University and Springer-Verlag GmbH Germany, part of Springer Nature 2018","order":0,"name":"copyright","group":{"name":"copyright","label":"Copyright"}}]}}