{"id":"https://openalex.org/W94462933","doi":"https://doi.org/10.1007/978-3-642-36818-9_32","title":"SA4WSs: A Security Architecture for Web Services","display_name":"SA4WSs: A Security Architecture for Web Services","publication_year":2013,"publication_date":"2013-01-01","ids":{"openalex":"https://openalex.org/W94462933","doi":"https://doi.org/10.1007/978-3-642-36818-9_32","mag":"94462933"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-36818-9_32","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-36818-9_32","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://inria.hal.science/hal-01480186","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063076296","display_name":"Lingxia Liu","orcid":"https://orcid.org/0000-0002-5753-7891"},"institutions":[{"id":"https://openalex.org/I4210104252","display_name":"Air Force Engineering University","ror":"https://ror.org/00seraz22","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210104252"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lingxia Liu","raw_affiliation_strings":["Beijing Institute of System Engineering, Beijing, China","National Key Laboratory of Science and Technology on Information System Security, Beijing, China","The Information and Navigation Institute, Air Force Engineering University, Xi\u2019an, China","National Key Laboratory of Science and Technology on Information System Security (China)","AFEU - Air Force Engineering University [Xi'an] (China)","Beijing Institute of System Engineering (China)"],"affiliations":[{"raw_affiliation_string":"Beijing Institute of System Engineering, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"National Key Laboratory of Science and Technology on Information System Security, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"The Information and Navigation Institute, Air Force Engineering University, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210104252"]},{"raw_affiliation_string":"National Key Laboratory of Science and Technology on Information System Security (China)","institution_ids":[]},{"raw_affiliation_string":"AFEU - Air Force Engineering University [Xi'an] (China)","institution_ids":["https://openalex.org/I4210104252"]},{"raw_affiliation_string":"Beijing Institute of System Engineering (China)","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101993889","display_name":"Dongxia Wang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dongxia Wang","raw_affiliation_strings":["Beijing Institute of System Engineering, Beijing, China","National Key Laboratory of Science and Technology on Information System Security, Beijing, China","National Key Laboratory of Science and Technology on Information System Security (China)","Beijing Institute of System Engineering (China)"],"affiliations":[{"raw_affiliation_string":"Beijing Institute of System Engineering, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"National Key Laboratory of Science and Technology on Information System Security, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"National Key Laboratory of Science and Technology on Information System Security (China)","institution_ids":[]},{"raw_affiliation_string":"Beijing Institute of System Engineering (China)","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048138933","display_name":"Jinjing Zhao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jinjing Zhao","raw_affiliation_strings":["Beijing Institute of System Engineering, Beijing, China","National Key Laboratory of Science and Technology on Information System Security, Beijing, China","National Key Laboratory of Science and Technology on Information System Security (China)","Beijing Institute of System Engineering (China)"],"affiliations":[{"raw_affiliation_string":"Beijing Institute of System Engineering, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"National Key Laboratory of Science and Technology on Information System Security, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"National Key Laboratory of Science and Technology on Information System Security (China)","institution_ids":[]},{"raw_affiliation_string":"Beijing Institute of System Engineering (China)","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017433539","display_name":"Minhuan Huang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Minhuan Huang","raw_affiliation_strings":["Beijing Institute of System Engineering, Beijing, China","National Key Laboratory of Science and Technology on Information System Security, Beijing, China","National Key Laboratory of Science and Technology on Information System Security (China)","Beijing Institute of System Engineering (China)"],"affiliations":[{"raw_affiliation_string":"Beijing Institute of System Engineering, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"National Key Laboratory of Science and Technology on Information System Security, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"National Key Laboratory of Science and Technology on Information System Security (China)","institution_ids":[]},{"raw_affiliation_string":"Beijing Institute of System Engineering (China)","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5063076296"],"corresponding_institution_ids":["https://openalex.org/I4210104252"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":0.6656,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.66971262,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"306","last_page":"311"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.826189398765564},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7782795429229736},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.7376586198806763},{"id":"https://openalex.org/keywords/ws-policy","display_name":"WS-Policy","score":0.618815541267395},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.5898688435554504},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5737395286560059},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.5622187256813049},{"id":"https://openalex.org/keywords/web-standards","display_name":"Web standards","score":0.5599883198738098},{"id":"https://openalex.org/keywords/sherwood-applied-business-security-architecture","display_name":"Sherwood Applied Business Security Architecture","score":0.5542362928390503},{"id":"https://openalex.org/keywords/web-modeling","display_name":"Web modeling","score":0.5197020173072815},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4999861717224121},{"id":"https://openalex.org/keywords/ws-i-basic-profile","display_name":"WS-I Basic Profile","score":0.45884430408477783},{"id":"https://openalex.org/keywords/services-computing","display_name":"Services computing","score":0.41131868958473206},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.1997617781162262},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.1864246129989624}],"concepts":[{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.826189398765564},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7782795429229736},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.7376586198806763},{"id":"https://openalex.org/C190515685","wikidata":"https://www.wikidata.org/wiki/Q749179","display_name":"WS-Policy","level":5,"score":0.618815541267395},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.5898688435554504},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5737395286560059},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.5622187256813049},{"id":"https://openalex.org/C182321512","wikidata":"https://www.wikidata.org/wiki/Q1153289","display_name":"Web standards","level":3,"score":0.5599883198738098},{"id":"https://openalex.org/C60172848","wikidata":"https://www.wikidata.org/wiki/Q7495506","display_name":"Sherwood Applied Business Security Architecture","level":5,"score":0.5542362928390503},{"id":"https://openalex.org/C130436687","wikidata":"https://www.wikidata.org/wiki/Q7978591","display_name":"Web modeling","level":3,"score":0.5197020173072815},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4999861717224121},{"id":"https://openalex.org/C38434365","wikidata":"https://www.wikidata.org/wiki/Q1066916","display_name":"WS-I Basic Profile","level":5,"score":0.45884430408477783},{"id":"https://openalex.org/C542858634","wikidata":"https://www.wikidata.org/wiki/Q7455845","display_name":"Services computing","level":3,"score":0.41131868958473206},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.1997617781162262},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.1864246129989624}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-642-36818-9_32","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-36818-9_32","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:HAL:hal-01480186v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01480186","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.306-311, &#x27E8;10.1007/978-3-642-36818-9_32&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"pmh:oai:HAL:hal-01480186v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01480186","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.306-311, &#x27E8;10.1007/978-3-642-36818-9_32&#x27E9;","raw_type":"Conference papers"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1494072022","https://openalex.org/W2127533221","https://openalex.org/W2408417652","https://openalex.org/W2484307742","https://openalex.org/W2594526743","https://openalex.org/W2947172417","https://openalex.org/W4229542063","https://openalex.org/W6609142272"],"related_works":["https://openalex.org/W1168306964","https://openalex.org/W2121283305","https://openalex.org/W2384679996","https://openalex.org/W2392154426","https://openalex.org/W2110060942","https://openalex.org/W2371044121","https://openalex.org/W2145170732","https://openalex.org/W2363904728","https://openalex.org/W2081008583","https://openalex.org/W2020457383"],"abstract_inverted_index":{"With":[0],"the":[1,8,23,28,51,59,63,79,88,109,116,124,127],"rapid":[2],"development":[3,29],"and":[4,14,87,122],"wide":[5],"application":[6],"of":[7,22,30,54,61,83,92,112,119,126],"Web":[9,31,47,55,72,84,93,101,113,120],"services,":[10],"its":[11],"security":[12,44,52,68,81,90,98],"flaws":[13],"vulnerabilities":[15],"are":[16],"increasing.":[17],"Security":[18],"has":[19],"become":[20],"one":[21],"key":[24],"issues":[25],"to":[26,41,49,76],"constrain":[27],"services":[32,48,73,85,102],"technology.":[33],"In":[34],"this":[35],"paper,":[36],"we":[37],"focus":[38],"on":[39],"how":[40],"build":[42],"a":[43,66,97],"architecture":[45,99,106],"for":[46,71,100],"meet":[50,77],"requirements":[53,82,91],"service":[56,94,114],"applications.":[57,95],"On":[58],"basis":[60],"analyzing":[62],"existing":[64],"methods,":[65],"new":[67],"implementation":[69,118],"approach":[70],"is":[74,103],"proposed":[75],"both":[78],"common":[80],"platform":[86],"specific":[89],"Then":[96],"proposed.":[104],"The":[105],"supports":[107],"separating":[108],"functional":[110],"implementations":[111],"from":[115],"non-functional":[117],"service,":[121],"ensures":[123],"portability":[125],"platform.":[128]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
