{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,9]],"date-time":"2024-07-09T02:05:29Z","timestamp":1720490729223},"reference-count":112,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T00:00:00Z","timestamp":1504224000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1016\/j.cose.2017.05.008","type":"journal-article","created":{"date-parts":[[2017,5,25]],"date-time":"2017-05-25T20:01:34Z","timestamp":1495742494000},"page":"144-178","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":11,"special_numbering":"C","title":["A distributed authentication model for composite Web services"],"prefix":"10.1016","volume":"70","author":[{"given":"Hassina","family":"Nacer","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1745-7093","authenticated-orcid":false,"given":"Nabil","family":"Djebari","sequence":"additional","affiliation":[]},{"given":"Hachem","family":"Slimani","sequence":"additional","affiliation":[]},{"given":"Djamil","family":"Aissani","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cose.2017.05.008_bib0010","first-page":"79","article-title":"A survey on trust and reputation models for web services: single, composite, and communities","volume":"43","author":"Abedel Wahab","year":"2015","journal-title":"Comput Stand Interfaces"},{"key":"10.1016\/j.cose.2017.05.008_bib0015","first-page":"61","article-title":"Toward a decision model based on trust and security risk management","volume":"vol. 98","author":"Alcalde","year":"2009"},{"key":"10.1016\/j.cose.2017.05.008_bib0020","series-title":"A systematic mapping study in microservice architecture","author":"Alshuqayran","year":"2016"},{"key":"10.1016\/j.cose.2017.05.008_bib0025","series-title":"Security certification of composite services: A test-based approach","author":"Anisetti","year":"2013"},{"key":"10.1016\/j.cose.2017.05.008_bib0030","series-title":"Proceeding of the 6th ACM workshop on formal methods in security engineering (FMSE)","first-page":"1","article-title":"Formal analysis of saml 2.0 web browser single sign-on: breaking the saml-based single sign-on for Google apps","author":"Armando","year":"2008"},{"issue":"9","key":"10.1016\/j.cose.2017.05.008_bib0035","first-page":"243","article-title":"Security in web services-issues and challenges","volume":"5","author":"Aruna","year":"2016","journal-title":"Int J Eng Technol"},{"key":"10.1016\/j.cose.2017.05.008_bib0040","series-title":"Dynamic monitoring of composed services","first-page":"235","author":"Asim","year":"2014"},{"key":"10.1016\/j.cose.2017.05.008_bib0045","series-title":"Security: a major threat for web services","author":"Balasubramanian","year":"2012"},{"key":"10.1016\/j.cose.2017.05.008_bib0050","series-title":"Dynamic inter-organizational cooperation setup in circle-of-trust environments","author":"Boursas","year":"2008"},{"key":"10.1016\/j.cose.2017.05.008_bib0055","series-title":"Benefits of federated identity to government","author":"Candia","year":"2004"},{"key":"10.1016\/j.cose.2017.05.008_bib0060","series-title":"Secure web service composition with untrusted broker","author":"Carminati","year":"2014"},{"key":"10.1016\/j.cose.2017.05.008_bib0065","series-title":"Federated identity management","author":"Chadwick","year":"1997"},{"key":"10.1016\/j.cose.2017.05.008_bib0070","series-title":"Proceedings of the IEEE international conference on web services (ICWS)","first-page":"59","article-title":"Using aspects for security engineering of web service composition","author":"Charfi","year":"2005"},{"issue":"4","key":"10.1016\/j.cose.2017.05.008_bib0075","doi-asserted-by":"crossref","first-page":"148","DOI":"10.4156\/jcit.vol8.issue4.18","article-title":"A community based algorithm for large scale web service composition","volume":"8","author":"Cherifi","year":"2013","journal-title":"J Converg Inform Technol"},{"issue":"1","key":"10.1016\/j.cose.2017.05.008_bib0080","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1007\/s10845-013-0855-6","article-title":"Qos ontology for service selection and reuse","volume":"27","author":"Chhum","year":"2016","journal-title":"J Intell Manuf"},{"key":"10.1016\/j.cose.2017.05.008_bib0085","series-title":"Proceeding of the 3rd workshop on ontologies and their applications (WONTO)","first-page":"427","article-title":"Personalized reliable web service compositions","author":"Claro","year":"2008"},{"key":"10.1016\/j.cose.2017.05.008_bib0090","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s10844-008-0067-2","article-title":"A dual-layered model for web services representation and composition","volume":"32","author":"Dahmani","year":"2009","journal-title":"J Intell Inform Syst"},{"issue":"1","key":"10.1016\/j.cose.2017.05.008_bib0095","doi-asserted-by":"crossref","first-page":"25","DOI":"10.18178\/lnit.4.1.25-29","article-title":"A conceptual framework secure web service: secure transaction logging system","volume":"4","author":"Daud","year":"2016","journal-title":"LNIT"},{"key":"10.1016\/j.cose.2017.05.008_bib0100","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"IT-22","author":"Deffie","year":"1976","journal-title":"IEEE Trans Inf Theory"},{"issue":"1","key":"10.1016\/j.cose.2017.05.008_bib0105","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/MSP.2007.16","article-title":"Providing web service security in a federated environment","volume":"5","author":"Delooze","year":"2007","journal-title":"Secur Privacy Mag IEEE"},{"issue":"8","key":"10.1016\/j.cose.2017.05.008_bib0110","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1145\/358722.358740","article-title":"Time-stamps in key distribution protocols","volume":"24","author":"Denning","year":"1981","journal-title":"Commun ACM"},{"key":"10.1016\/j.cose.2017.05.008_bib0115","series-title":"Shibboleth architecture","author":"Dors","year":"2005"},{"key":"10.1016\/j.cose.2017.05.008_bib0120","series-title":"Enhance matching web service security policies with semantic","author":"Dung","year":"2014"},{"key":"10.1016\/j.cose.2017.05.008_bib0125","series-title":"Identity harmonization for federated hpc, grid and cloud services","author":"Ertl","year":"2016"},{"key":"10.1016\/j.cose.2017.05.008_bib0130","series-title":"Security patterns in practice: building secure architectures using software patterns","author":"Fernandez","year":"2012"},{"key":"10.1016\/j.cose.2017.05.008_bib0135","doi-asserted-by":"crossref","first-page":"430","DOI":"10.3390\/fi4020430","article-title":"A survey of patterns for web services security and reliability standards","volume":"4","author":"Fernandez","year":"2012","journal-title":"Future Internet"},{"key":"10.1016\/j.cose.2017.05.008_bib0140","series-title":"PGP: Pretty Good Privacy","author":"Garfinkel","year":"1995"},{"key":"10.1016\/j.cose.2017.05.008_bib0145","series-title":"Security analysis of the saml single sign-on browser\/artifact profile","author":"Grob","year":"2001"},{"key":"10.1016\/j.cose.2017.05.008_bib0150","series-title":"Vita. Challenges in the adoption and diffusion of web services in financial institutions","author":"Guilherme","year":"2004"},{"key":"10.1016\/j.cose.2017.05.008_bib0155","series-title":"Evaluation and comparison of styles of using web services","first-page":"139","author":"Halili","year":"2014"},{"key":"10.1016\/j.cose.2017.05.008_bib0160","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1016\/j.sysarc.2009.01.004","article-title":"Secure web services using two way authentication and tree-party key establishment for service delivery","volume":"55","author":"Han","year":"2009","journal-title":"J Syst Architect"},{"key":"10.1016\/j.cose.2017.05.008_bib0165","series-title":"The oauth 2.0 authorization framework","author":"Hardt","year":"2012"},{"key":"10.1016\/j.cose.2017.05.008_bib0170","author":"Hayes"},{"issue":"2","key":"10.1016\/j.cose.2017.05.008_bib0175","first-page":"240","article-title":"Privacy and recovery in composite web service","volume":"3","author":"Hewett","year":"2010","journal-title":"Trans Int J Info"},{"key":"10.1016\/j.cose.2017.05.008_bib0180","series-title":"Single sign-on","author":"Husti","year":"2009"},{"key":"10.1016\/j.cose.2017.05.008_bib0185","doi-asserted-by":"crossref","first-page":"1326","DOI":"10.1016\/j.jss.2009.03.001","article-title":"Wsdl and uddi extensions for version support in web services","volume":"82","author":"Juric","year":"2009","journal-title":"J Syst Softw"},{"issue":"4","key":"10.1016\/j.cose.2017.05.008_bib0190","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MIS.2004.23","article-title":"Authorization and privacy for semantic web services","volume":"19","author":"Kagal","year":"2004","journal-title":"IEEE Intell Syst"},{"key":"10.1016\/j.cose.2017.05.008_bib0195","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.scico.2014.06.016","article-title":"Service composition with consideration of independent security objectives","volume":"97","author":"Karatas","year":"2015","journal-title":"Sci Comput Program"},{"key":"10.1016\/j.cose.2017.05.008_bib0200","series-title":"The entice approach to decompose monolithic services into microservices","first-page":"591","author":"Kecskemeti","year":"2016"},{"issue":"2","key":"10.1016\/j.cose.2017.05.008_bib0205","first-page":"234","article-title":"A flexible and secure web service architectural model based on pki and agent technology","volume":"3","author":"Khemakhem","year":"2010","journal-title":"Int J Inform"},{"key":"10.1016\/j.cose.2017.05.008_bib0210","series-title":"Internet governance, in an age of cyber insecurity","author":"Knake","year":"2010"},{"key":"10.1016\/j.cose.2017.05.008_bib0215","series-title":"Proceeding of the IFIP International Federation for Information Processing","first-page":"547","article-title":"Web service discovery in a semantically extended uddi registry: the case of fusion","author":"Kourtesis","year":"2007"},{"issue":"7","key":"10.1016\/j.cose.2017.05.008_bib0220","first-page":"12","article-title":"Security issues in web services: a evaluation and advancement perspective concerning research agenda","volume":"135","author":"Kumar","year":"2016","journal-title":"Int J Comput Appl"},{"key":"10.1016\/j.cose.2017.05.008_bib0225","series-title":"Proceeding of the international conference on big data, cloud and applications","first-page":"56","article-title":"The security of web services: secure communication and identity management","author":"Lamrani","year":"2015"},{"key":"10.1016\/j.cose.2017.05.008_bib0230","series-title":"Microservice-based architecture for the nrdc","first-page":"1659","author":"Le","year":"2015"},{"issue":"3","key":"10.1016\/j.cose.2017.05.008_bib0235","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/2831270","article-title":"Web service composition: a survey of techniques and tools","volume":"48","author":"Lemos","year":"2016","journal-title":"ACM Comput Surv"},{"key":"10.1016\/j.cose.2017.05.008_bib0240","series-title":"Proceeding of the IEEE international symposium on Collaborative Technologies and Systems (CTS)","first-page":"476","article-title":"Enabling collaboration between heterogenous circles of trust through innovative identity solutions","author":"Lezoray","year":"2009"},{"key":"10.1016\/j.cose.2017.05.008_bib0245","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/s10207-008-0068-8","article-title":"Denial of service attacks and defenses in decentralized trust management","volume":"8","author":"Liand","year":"2009","journal-title":"Int J Inform Secur"},{"key":"10.1016\/j.cose.2017.05.008_bib0250","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1007\/s10207-010-0106-1","article-title":"Exam: a comprehensive environment for the analysis of access control policies","volume":"9","author":"Lin","year":"2010","journal-title":"Int J Inform Secur"},{"issue":"1","key":"10.1016\/j.cose.2017.05.008_bib0255","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/TSC.2009.28","article-title":"Facts: a framework for fault-tolerant composition of transactional web services","volume":"3","author":"Liu","year":"2010","journal-title":"Serv Comput IEEE Trans"},{"key":"10.1016\/j.cose.2017.05.008_bib0260","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1016\/j.jnca.2007.12.003","article-title":"A distributed extensible authentication model based on kerberos","volume":"31","author":"Liu","year":"2008","journal-title":"J Netw Comput Appl"},{"issue":"1","key":"10.1016\/j.cose.2017.05.008_bib0265","first-page":"136","article-title":"Prevention of fault propagation in web service: a complex network approach","volume":"14","author":"Liu","year":"2015","journal-title":"J Web Eng"},{"issue":"4","key":"10.1016\/j.cose.2017.05.008_bib0270","doi-asserted-by":"crossref","first-page":"885","DOI":"10.1007\/s00778-009-0138-1","article-title":"Rateweb: reputation assessment for trust establishment among web services","volume":"18","author":"Malik","year":"2009","journal-title":"VLDB J"},{"issue":"6","key":"10.1016\/j.cose.2017.05.008_bib0275","first-page":"23","article-title":"Providing privacy for composition results in web service using data anonymization","volume":"3","author":"Manikandan","year":"2014","journal-title":"Int J Emerg Trend Technol Comput Sci"},{"key":"10.1016\/j.cose.2017.05.008_bib0280","series-title":"The challenges of secure and trustworthy service composition in the future internet","author":"Meland","year":"2011"},{"issue":"3\u20134","key":"10.1016\/j.cose.2017.05.008_bib0285","first-page":"185","article-title":"An unified authentication framework for accessing heterogeneous web services","volume":"3","author":"Moss","year":"2008","journal-title":"Int J Web Serv Pract"},{"key":"10.1016\/j.cose.2017.05.008_bib0290","series-title":"Proceedings of the 13th International Conference on Information Integration and Web-based Applications and Services (IIWAS)","first-page":"112","article-title":"Security-aware web service composition approaches: state-of-the-art","author":"Movahednejad","year":"2011"},{"issue":"4","key":"10.1016\/j.cose.2017.05.008_bib0295","doi-asserted-by":"crossref","first-page":"673","DOI":"10.19026\/rjaset.7.304","article-title":"Novel security evaluation criteria for web services composition","volume":"7","author":"Movahednejad","year":"2014","journal-title":"Res J Applied Sci Eng Technol"},{"key":"10.1016\/j.cose.2017.05.008_bib0300","series-title":"A two layer mixed integer programming model for dynamic composite web service selection in virtual organization inspired by layering as optimization decomposition","author":"Mulongo","year":"2016"},{"key":"10.1016\/j.cose.2017.05.008_bib0305","series-title":"Proceeding of the 7th ACM workshop on digital identity management (DIM)","first-page":"73","article-title":"Behavioral biometrics for persistent single sign-on","author":"Mustafic","year":"2011"},{"key":"10.1016\/j.cose.2017.05.008_bib0310","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1016\/j.jnca.2014.04.015","article-title":"Semantic web services: standards, applications, challenges and solutions","volume":"44","author":"Nacer","year":"2014","journal-title":"J Netw Comput Appl"},{"issue":"6","key":"10.1016\/j.cose.2017.05.008_bib0315","doi-asserted-by":"crossref","first-page":"1108","DOI":"10.1016\/j.csi.2008.09.041","article-title":"Semantic annotations for web services discovery and composition","volume":"31","author":"Nacer Talantikite","year":"2009","journal-title":"Comput Stand Interfaces"},{"issue":"2","key":"10.1016\/j.cose.2017.05.008_bib0320","doi-asserted-by":"crossref","first-page":"29","DOI":"10.4018\/jwsr.2011040102","article-title":"Reputation management for composite services in service oriented systems","volume":"8","author":"Nepal","year":"2011","journal-title":"Int J Web Serv Res"},{"key":"10.1016\/j.cose.2017.05.008_bib0325","series-title":"A multi-objective optimization method for service composition problem with sharing property","author":"Ning","year":"2016"},{"key":"10.1016\/j.cose.2017.05.008_bib0330","series-title":"Engineering secure adaptable web services composition","author":"Nkomo","year":"2016"},{"key":"10.1016\/j.cose.2017.05.008_bib0335","first-page":"190","article-title":"A privacy preserving approach for identity management as a service","volume":"13","author":"Nunez","year":"2014","journal-title":"Int J Inform Secur"},{"issue":"3","key":"10.1016\/j.cose.2017.05.008_bib0340","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1993053.1993055","article-title":"Acconv \u2013 an access control model for conversational web services","volume":"5","author":"Paci","year":"2011","journal-title":"ACM Trans Web"},{"key":"10.1016\/j.cose.2017.05.008_bib0345","series-title":"Proceeding of the 11th international conference on information systems security","first-page":"21","article-title":"Extending mandatory access control policies in android","author":"Paraboschi","year":"2015"},{"issue":"3","key":"10.1016\/j.cose.2017.05.008_bib0350","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1093\/jigpal\/8.3.239","article-title":"Practical reasoning for very expressive description logics","volume":"8","author":"Pellet","year":"2000","journal-title":"Log J LGPL"},{"issue":"2","key":"10.1016\/j.cose.2017.05.008_bib0355","first-page":"2242","article-title":"Survey of different types of captcha","volume":"5","author":"Prakash","year":"2014","journal-title":"Int J Comput Sci Inform Technol"},{"issue":"5","key":"10.1016\/j.cose.2017.05.008_bib0360","first-page":"3019","article-title":"An enhanced authentication system using multi-level security for web services","volume":"3","author":"Pranal","year":"2015","journal-title":"Int J Recent Innov Trend Comput Commun"},{"key":"10.1016\/j.cose.2017.05.008_bib0365","series-title":"Authorization federation in iaas multi cloud","author":"Pustchi","year":"2015"},{"key":"10.1016\/j.cose.2017.05.008_bib0370","series-title":"Chapter of data and applications security and privacy","first-page":"106","article-title":"Role-centric circle-of-trust in multi-tenant cloud iaas","volume":"vol. 9766","author":"Pustchil","year":"2016"},{"issue":"2","key":"10.1016\/j.cose.2017.05.008_bib0375","first-page":"435","article-title":"Providing security for web service composition using finite state machine","volume":"4","author":"Raju","year":"2013","journal-title":"Int J Comput Technol"},{"key":"10.1016\/j.cose.2017.05.008_bib0380","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signature and public keys cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"ACM Commun"},{"issue":"1","key":"10.1016\/j.cose.2017.05.008_bib0385","first-page":"875","article-title":"Architectural framework for secure composite web services","volume":"76","author":"Sathiaseelan","year":"2013","journal-title":"Int J Comput Appl"},{"issue":"4","key":"10.1016\/j.cose.2017.05.008_bib0390","first-page":"71","article-title":"Mlsf: a framework for multi-level secure composite web services","volume":"2","author":"Sathiaseelan","year":"2010","journal-title":"J Adv Inform Sci Serv Sci"},{"key":"10.1016\/j.cose.2017.05.008_bib0395","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1007\/s11280-014-0278-0","article-title":"Qos aware descriptions for restful service composition: security domain","volume":"18","author":"Sepulveda","year":"2015","journal-title":"World Wide Web"},{"key":"10.1016\/j.cose.2017.05.008_bib0400","series-title":"Web services security assessment: An authentication-focused approach","author":"Soupionis","year":"2012"},{"key":"10.1016\/j.cose.2017.05.008_bib0405","series-title":"Proceeding of the 3rd international conference on cloud computing and service science (CLOSER)","first-page":"175","article-title":"A versatile and scalable everything-as-a-service registry and discovery","author":"Spillner","year":"2013"},{"key":"10.1016\/j.cose.2017.05.008_bib0410","series-title":"Cryptography and network security: principles and practices","author":"Stallings","year":"2006"},{"key":"10.1016\/j.cose.2017.05.008_bib0415","series-title":"European Semantic Web Conference (ESWC)","article-title":"Foaf+ssl: restful authentication for the social web","author":"Story","year":"2009"},{"issue":"12","key":"10.1016\/j.cose.2017.05.008_bib0420","doi-asserted-by":"crossref","first-page":"7937","DOI":"10.1016\/j.eswa.2010.04.041","article-title":"Knowledge-based rfid enabled web service architecture for supply chain management","volume":"37","author":"Sundaram","year":"2010","journal-title":"Expert Syst Appl"},{"issue":"9","key":"10.1016\/j.cose.2017.05.008_bib0425","doi-asserted-by":"crossref","first-page":"1798","DOI":"10.3844\/jcssp.2014.1798.1810","article-title":"Intelligent search engine-based universal description, discovery and integration for web service discovery","volume":"10","author":"Tamilarasi","year":"2014","journal-title":"J Comput Sci"},{"key":"10.1016\/j.cose.2017.05.008_bib0430","series-title":"Proceeding of the IEEE international conference on IRI","first-page":"129","article-title":"Cross-tenant trust models in cloud computing","author":"Tang","year":"2013"},{"issue":"2","key":"10.1016\/j.cose.2017.05.008_bib0435","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1109\/TSC.2013.18","article-title":"Privacy-enhanced web service composition","volume":"7","author":"Tbahriti","year":"2014","journal-title":"IEEE Trans Serv Comput"},{"key":"10.1016\/j.cose.2017.05.008_bib0440","series-title":"Privacy-aware web services selection and composition","author":"Tianyang","year":"2014"},{"key":"10.1016\/j.cose.2017.05.008_bib0445","series-title":"Introduction to information security","first-page":"125","article-title":"Chapter 7 \u2013 resistance strategies: Authentication and permissions","author":"Timothy","year":"2014"},{"issue":"3A","key":"10.1016\/j.cose.2017.05.008_bib0450","doi-asserted-by":"crossref","first-page":"83","DOI":"10.12928\/telkomnika.v14i3A.4408","article-title":"Service selection algorithm of two layer qos model based on functional grouping","volume":"14","author":"Wang","year":"2016","journal-title":"Telekomnika"},{"key":"10.1016\/j.cose.2017.05.008_bib0500","author":"Web-Site"},{"key":"10.1016\/j.cose.2017.05.008_bib0455","author":"Web-Site"},{"key":"10.1016\/j.cose.2017.05.008_bib0520","author":"Web-Site"},{"key":"10.1016\/j.cose.2017.05.008_bib0485","author":"Web-Site"},{"key":"10.1016\/j.cose.2017.05.008_bib0490","author":"Web-Site"},{"key":"10.1016\/j.cose.2017.05.008_bib0475","author":"Web-Site"},{"key":"10.1016\/j.cose.2017.05.008_bib0495","author":"Web-Site"},{"key":"10.1016\/j.cose.2017.05.008_bib0460","author":"Web-Site"},{"key":"10.1016\/j.cose.2017.05.008_bib0525","author":"Web-Site"},{"key":"10.1016\/j.cose.2017.05.008_bib0515","author":"Web-Site"},{"key":"10.1016\/j.cose.2017.05.008_bib0530","author":"Web-Site"},{"key":"10.1016\/j.cose.2017.05.008_bib0505","author":"Web-Site"},{"key":"10.1016\/j.cose.2017.05.008_bib0510","author":"Web-Site"},{"key":"10.1016\/j.cose.2017.05.008_bib0470","author":"Web-Site"},{"key":"10.1016\/j.cose.2017.05.008_bib0480","author":"Web-Site"},{"key":"10.1016\/j.cose.2017.05.008_bib0465","author":"Web-Site"},{"issue":"1","key":"10.1016\/j.cose.2017.05.008_bib0535","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1504\/IJHPSA.2014.059860","article-title":"Private mutual authentication with fuzzy matching","volume":"5","author":"Wen","year":"2014","journal-title":"Int J High Perform Syst Architect"},{"issue":"1","key":"10.1016\/j.cose.2017.05.008_bib0540","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/TSC.2010.33","article-title":"Dynamic authentication for cross-realm soa-based business processes","volume":"5","author":"Xu","year":"2012","journal-title":"IEEE Trans Serv Comput"},{"issue":"1","key":"10.1016\/j.cose.2017.05.008_bib0545","doi-asserted-by":"crossref","first-page":"87","DOI":"10.4018\/jwsr.2009092205","article-title":"A model-based approach for diagnosing fault in web service processes","volume":"6","author":"Yan","year":"2009","journal-title":"Int J Web Serv Res"},{"key":"10.1016\/j.cose.2017.05.008_bib0550","doi-asserted-by":"crossref","first-page":"1349","DOI":"10.1007\/s11277-013-1254-1","article-title":"Rule-based security capabilities matching for web services","volume":"73","author":"Yu","year":"2013","journal-title":"Wireless Pers Commun"},{"key":"10.1016\/j.cose.2017.05.008_bib0555","series-title":"Virtual web services and its application in e-commerce","author":"Yugen","year":"2010"},{"key":"10.1016\/j.cose.2017.05.008_bib0560","series-title":"Proceedings of the IEEE international conference on web services","first-page":"818","article-title":"Trust management for web services","author":"Zhao","year":"2008"},{"key":"10.1016\/j.cose.2017.05.008_bib0565","series-title":"Scenetester: a testing framework to support fault diagnosis for web service composition","author":"Zhu","year":"2011"}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404817301153?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404817301153?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,10,8]],"date-time":"2020-10-08T15:38:55Z","timestamp":1602171535000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404817301153"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":112,"alternative-id":["S0167404817301153"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2017.05.008","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2017,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A distributed authentication model for composite Web services","name":"articletitle","label":"Article Title"},{"value":"Computers & Security","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cose.2017.05.008","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2017 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}