{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T04:06:07Z","timestamp":1730174767385,"version":"3.28.0"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031426216"},{"type":"electronic","value":"9783031426223"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-42622-3_13","type":"book-chapter","created":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T23:07:29Z","timestamp":1695078449000},"page":"177-189","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Securing Collaborative Networks: Requirements of Supporting Secured Collaborative Processes"],"prefix":"10.1007","author":[{"given":"Paul","family":"de Vrieze","sequence":"first","affiliation":[]},{"given":"Lai","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,19]]},"reference":[{"key":"13_CR1","unstructured":"European Union. Regulation 2016\/679 (General Data Protection Regulation). Official Journal of the European Union 59, 1\u201388 (2016)"},{"key":"13_CR2","unstructured":"Ferraiolo, D., Kuhn, R.: Role-based access control. In: 15th NIST-NCSC National Computer Security Conference, pp. 554\u2013563 (1992)"},{"key":"13_CR3","doi-asserted-by":"publisher","unstructured":"Hu, V.C., Ferraiolo, D., Kuhn, R., et al.: Guide to attribute based access control (ABAC) definition and considerations. NIST Special Publication 800:162 (2014). https:\/\/doi.org\/10.6028\/NIST.SP.800-162","DOI":"10.6028\/NIST.SP.800-162"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Thomas, R.K., Sandhu, R.S.: Towards a task-based paradigm for flexible and adaptable access control in distributed applications. In: Proceedings on the 1992-1993 Workshop on New Security Paradigms, pp. 138\u2013142. ACM, New York (1993)","DOI":"10.1145\/283751.283810"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Thomas, R.K., Sandhu, R.S.: Conceptual foundations for a model of task-based authorisations. In: Proceedings the Computer Security Foundations Workshop VII, Franconia, NH, pp. 66\u201379. IEEE Computer Society (1994)","DOI":"10.1109\/CSFW.1994.315946"},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-0-387-35285-5_10","volume-title":"Database Security XI: Status and Prospects","author":"RK Thomas","year":"1998","unstructured":"Thomas, R.K., Sandhu, R.S.: Task-based authorisation controls (TBAC): a family of models for active and enterprise-oriented authorisation management. In: Lin, T.Y., Qian, S. (eds.) Database Security XI: Status and Prospects, pp. 166\u2013181. Springer, Boston (1998). https:\/\/doi.org\/10.1007\/978-0-387-35285-5_10"},{"key":"13_CR7","unstructured":"Thomas, R., Sandhu, R., Das, S.: Task-Based Authorisations, Ithaca, NY (1999)"},{"key":"13_CR8","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1016\/S0306-4379(02)00029-7","volume":"28","author":"S Oh","year":"2003","unstructured":"Oh, S., Park, S.: Task\u2013role-based access control model. Inf. Syst. 28, 533\u2013562 (2003). https:\/\/doi.org\/10.1016\/S0306-4379(02)00029-7","journal-title":"Inf. Syst."},{"issue":"3","key":"13_CR9","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/j.infsof.2013.12.004","volume":"56","author":"M Leitner","year":"2014","unstructured":"Leitner, M., Rinderle-Ma, S.: A systematic review on security in process-aware information systems \u2013 constitution, challenges, and future directions. Inf. Softw. Technol. 56(3), 273\u2013293 (2014). https:\/\/doi.org\/10.1016\/j.infsof.2013.12.004","journal-title":"Inf. Softw. Technol."},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Thomas, R.K., Sandhu, R.S.: Towards a task-based paradigm for flexible and adaptable access control in distributed applications. In: Proceedings New Security Paradigms Workshop, pp. 138\u2013142 (1993)","DOI":"10.1145\/283751.283810"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Jones, M., Hardt, D.: The OAuth 2.0 Authorisation Framework: Bearer Token Usage [RFC 6750] (2012)","DOI":"10.17487\/rfc6750"},{"key":"13_CR12","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-642-31540-4_4","volume-title":"Data and Applications Security and Privacy XXVI","author":"X Jin","year":"2012","unstructured":"Jin, X., Krishnan, R., Sandhu, R.: A unified attribute-based access control model covering DAC, MAC and RBAC. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) Data and Applications Security and Privacy XXVI, pp. 41\u201355. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31540-4_4"},{"key":"13_CR13","doi-asserted-by":"publisher","unstructured":"Sandhu, R.: The authorisation leap from rights to attributes: maturation or chaos? In: Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT, pp. 69\u201370 (2012). https:\/\/doi.org\/10.1145\/2295136.2295150","DOI":"10.1145\/2295136.2295150"},{"key":"13_CR14","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1016\/j.infsof.2014.04.010","volume":"56","author":"S Schefer-Wenzl","year":"2014","unstructured":"Schefer-Wenzl, S., Strembeck, M.: Model-driven specification and enforcement of RBAC break-glass policies for process-aware information systems. Inf. Softw. Technol. 56, 1289\u20131308 (2014). https:\/\/doi.org\/10.1016\/j.infsof.2014.04.010","journal-title":"Inf. Softw. Technol."},{"issue":"6","key":"13_CR15","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.compind.2009.02.009","volume":"60","author":"Y Lu","year":"2009","unstructured":"Lu, Y., Zhang, L., Sun, J.: Task-activity based access control for process collaboration environments. Comput. Ind. 60(6), 403\u2013415 (2009). https:\/\/doi.org\/10.1016\/j.compind.2009.02.009","journal-title":"Comput. Ind."},{"key":"13_CR16","unstructured":"Jordan, D., Evdemon, J., Alves, A., et al.: Web services business process execution language version 2.0 (OASIS standard). WS-BPEL, pp. 1\u2013264 (2007)"},{"key":"13_CR17","doi-asserted-by":"publisher","unstructured":"OMG. Business Process Model and Notation (BPMN) Version 2.0. Business 50:170 (2011). https:\/\/doi.org\/10.1007\/s11576-008-0096-z","DOI":"10.1007\/s11576-008-0096-z"},{"key":"13_CR18","unstructured":"Parducci, B., Lockhart, H.: eXtensible Access Control Markup Language (XACML) Version 3.0 (2013)"},{"key":"13_CR19","unstructured":"Sakimura, N., Bradley, J., Jones, M., et al.: OpenID Connect Core 1.0 (2014)"},{"key":"13_CR20","unstructured":"Maler, E., Machulak, M., Richer, J., Hardjono, T.: User-Managed Access (UMA) 2.0 Grant for OAuth 2.0 Authorisation. Network Working Group (2019). https:\/\/tools.ietf.org\/html\/draft-maler-oauth-umagrant-00"},{"key":"13_CR21","unstructured":"Maler, E., Machulak, M., Richer, J., Hardjono, T.: Federated Authorisation for User-Managed Access UMA\u201a 2.0. Network Working Group (2019) https:\/\/datatracker.ietf.org\/doc\/html\/draft-maler-oauth-umafedauthz-00. Accessed 7 July 2021"},{"key":"13_CR22","unstructured":"Lockhart, H., Campbell, B., Ragouzis, N., et al.: SAML v2.0 Technical Overview (2005)"},{"key":"13_CR23","unstructured":"He, R., Yuan, M., Hu, J., et al.: A novel service-oriented AAA architecture. In: 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, PIMRC 2003, pp. 2833\u20132837. IEEE (2003)"},{"key":"13_CR24","unstructured":"Gommans, L., Travostino, F., Vollbrecht, J., et al.: Token-based authorisation of connection oriented network resources. In: GRIDNETS Conference Proceedings. System and Network Engineering (IVI, FNWI), Amsterdam (2004)"},{"key":"13_CR25","doi-asserted-by":"publisher","first-page":"1703","DOI":"10.3390\/s22051703","volume":"22","author":"A Chatterjee","year":"2022","unstructured":"Chatterjee, A., Prinz, A.: Applying spring security framework with KeyCloak-based OAuth2 to protect microservice architecture APIs: a case study. Sensors 22, 1703 (2022). https:\/\/doi.org\/10.3390\/s22051703","journal-title":"Sensors"},{"key":"13_CR26","unstructured":"Politze, M.: A reference architecture and implementation enabling data protection in distributed learning and science processes. RWTH Aachen University (2019)"},{"key":"13_CR27","unstructured":"Politze, M., Decker, B.: Extending the OAuth2 workflow to audit data usage for users and service providers in a cooperative scenario. In: 10. DFN-Forum Kommunikationstechnologien. Gesellschaft f\u00fcr Informatik eV"},{"key":"13_CR28","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.procir.2021.10.023","volume":"103","author":"E Sch\u00e4ffer","year":"2021","unstructured":"Sch\u00e4ffer, E., Schobert, M., Reichenstein, T., et al.: Reference architecture and agile development method for a process-driven web platform based on the BPMN-standard and process engines. Procedia CIRP 103, 146\u2013151 (2021). https:\/\/doi.org\/10.1016\/j.procir.2021.10.023","journal-title":"Procedia CIRP"},{"key":"13_CR29","doi-asserted-by":"crossref","unstructured":"Karadimas, D., Panagiotou, C., Gialelis, J., et al.: Process based machine learning for energy optimization in industrial enterprises. In: 2021 10th Mediterranean Conference on Embedded Computing (MECO), pp. 1\u20134. IEEE (2021)","DOI":"10.1109\/MECO52532.2021.9460275"},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Suzic, B.: Securing integration of cloud services in cross-domain distributed environments. In: Proceedings of the 31st Annual ACM Symposium on Applied Computing, pp. 398\u2013405. ACM, New York (2016)","DOI":"10.1145\/2851613.2851622"},{"key":"13_CR31","doi-asserted-by":"crossref","unstructured":"Suzic, B.: User-centered security management of API-based data integration workflows. In: 2016 IEEE\/IFIP Network Operations and Management Symposium, NOMS 2016, pp. 1233\u20131238. IEEE (2016)","DOI":"10.1109\/NOMS.2016.7502993"},{"key":"13_CR32","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/1057977.1057979","volume":"37","author":"W Tolone","year":"2005","unstructured":"Tolone, W., Ahn, G.-J., Pai, T., Hong, S.-P.: Access control in collaborative systems. ACM Comput. Surv. 37, 29\u201341 (2005). https:\/\/doi.org\/10.1145\/1057977.1057979","journal-title":"ACM Comput. Surv."},{"key":"13_CR33","doi-asserted-by":"crossref","unstructured":"Saltzer, J.H.: Protection and control of information sharing in Multics. In: Proceedings of the 4th ACM Symposium on Operating Systems Principles, SOSP 1973, p. 119 (1973)","DOI":"10.1145\/957195.808059"}],"container-title":["IFIP Advances in Information and Communication Technology","Collaborative Networks in Digitalization and Society 5.0"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-42622-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T09:08:00Z","timestamp":1730106480000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-42622-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031426216","9783031426223"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-42622-3_13","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"19 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRO-VE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Working Conference on Virtual Enterprises","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Valencia","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pro-ve2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pro-ve-2022.ipl.pt\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"119","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"59","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}