{"id":"https://openalex.org/W2161112246","doi":"https://doi.org/10.1108/09685220710748010","title":"Analysis of security\u2010relevant semantics of BPEL in cross\u2010domain defined business processes","display_name":"Analysis of security\u2010relevant semantics of BPEL in cross\u2010domain defined business processes","publication_year":2007,"publication_date":"2007-05-01","ids":{"openalex":"https://openalex.org/W2161112246","doi":"https://doi.org/10.1108/09685220710748010","mag":"2161112246"},"language":"en","primary_location":{"id":"doi:10.1108/09685220710748010","is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685220710748010","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109909335","display_name":"Klaus Fischer","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"K.P. Fischer","raw_affiliation_strings":["Digamma Communications Consulting GmbH, M\u00fchltal, Germany"],"affiliations":[{"raw_affiliation_string":"Digamma Communications Consulting GmbH, M\u00fchltal, Germany","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008047608","display_name":"Udo Bleimann","orcid":null},"institutions":[{"id":"https://openalex.org/I107257983","display_name":"Darmstadt University of Applied Sciences","ror":"https://ror.org/047wbd030","country_code":"DE","type":"education","lineage":["https://openalex.org/I107257983"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"U. Bleimann","raw_affiliation_strings":["Aida Institute of Applied Informatics Darmstadt, University of Applied Sciences, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Aida Institute of Applied Informatics Darmstadt, University of Applied Sciences, Darmstadt, Germany","institution_ids":["https://openalex.org/I107257983"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052212774","display_name":"Woldemar Fuhrmann","orcid":null},"institutions":[{"id":"https://openalex.org/I107257983","display_name":"Darmstadt University of Applied Sciences","ror":"https://ror.org/047wbd030","country_code":"DE","type":"education","lineage":["https://openalex.org/I107257983"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"W. Fuhrmann","raw_affiliation_strings":["Aida Institute of Applied Informatics Darmstadt, University of Applied Sciences, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Aida Institute of Applied Informatics Darmstadt, University of Applied Sciences, Darmstadt, Germany","institution_ids":["https://openalex.org/I107257983"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033160778","display_name":"Steven Furnell","orcid":"https://orcid.org/0000-0003-0984-7542"},"institutions":[{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"S.M. Furnell","raw_affiliation_strings":["Network Research Group, University of Plymouth, Plymouth, UK"],"affiliations":[{"raw_affiliation_string":"Network Research Group, University of Plymouth, Plymouth, UK","institution_ids":["https://openalex.org/I897542642"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5109909335"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.26078073,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"15","issue":"2","first_page":"116","last_page":"127"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/business-process-execution-language","display_name":"Business Process Execution Language","score":0.9571965932846069},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8147698044776917},{"id":"https://openalex.org/keywords/scripting-language","display_name":"Scripting language","score":0.5981776118278503},{"id":"https://openalex.org/keywords/business-process","display_name":"Business process","score":0.5085774660110474},{"id":"https://openalex.org/keywords/business-domain","display_name":"Business domain","score":0.5059506297111511},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.5037712454795837},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.4821488559246063},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.4627878963947296},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.43465158343315125},{"id":"https://openalex.org/keywords/business-process-modeling","display_name":"Business process modeling","score":0.37297749519348145},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3347134590148926},{"id":"https://openalex.org/keywords/service-oriented-architecture","display_name":"Service-oriented architecture","score":0.3148798942565918},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2574511766433716},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07179716229438782},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.06839463114738464}],"concepts":[{"id":"https://openalex.org/C4927394","wikidata":"https://www.wikidata.org/wiki/Q787631","display_name":"Business Process Execution Language","level":4,"score":0.9571965932846069},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8147698044776917},{"id":"https://openalex.org/C61423126","wikidata":"https://www.wikidata.org/wiki/Q187432","display_name":"Scripting language","level":2,"score":0.5981776118278503},{"id":"https://openalex.org/C85345410","wikidata":"https://www.wikidata.org/wiki/Q851587","display_name":"Business process","level":3,"score":0.5085774660110474},{"id":"https://openalex.org/C193669473","wikidata":"https://www.wikidata.org/wiki/Q5001867","display_name":"Business domain","level":5,"score":0.5059506297111511},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.5037712454795837},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4821488559246063},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.4627878963947296},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.43465158343315125},{"id":"https://openalex.org/C207505557","wikidata":"https://www.wikidata.org/wiki/Q4374012","display_name":"Business process modeling","level":4,"score":0.37297749519348145},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3347134590148926},{"id":"https://openalex.org/C57041688","wikidata":"https://www.wikidata.org/wiki/Q220644","display_name":"Service-oriented architecture","level":3,"score":0.3148798942565918},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2574511766433716},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07179716229438782},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.06839463114738464},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C174998907","wikidata":"https://www.wikidata.org/wiki/Q357662","display_name":"Work in process","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/09685220710748010","is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685220710748010","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1496026898","https://openalex.org/W2005358861","https://openalex.org/W2006867623","https://openalex.org/W2065764775","https://openalex.org/W2098820143","https://openalex.org/W2110723603","https://openalex.org/W2128512114","https://openalex.org/W2131833513","https://openalex.org/W2132639510","https://openalex.org/W2135740058","https://openalex.org/W2141970151","https://openalex.org/W2145252617","https://openalex.org/W2153074919","https://openalex.org/W2154765153","https://openalex.org/W4231110993","https://openalex.org/W6679919932"],"related_works":["https://openalex.org/W2009028038","https://openalex.org/W2277299745","https://openalex.org/W2371061667","https://openalex.org/W2767168670","https://openalex.org/W1974234910","https://openalex.org/W1628200176","https://openalex.org/W2105633150","https://openalex.org/W2150801992","https://openalex.org/W93556318","https://openalex.org/W1602347601"],"abstract_inverted_index":{"Purpose":[0],"Aims":[1],"to":[2,48,120,138,159,173,188,205],"identify":[3],"security\u2010relevant":[4],"semantics":[5,167],"of":[6,34,46,51,65,87,93,104,108,123,133,149,165,168,182,196],"business":[7,30,52,96,129,197],"processes":[8,31,53,97,198],"being":[9,63],"defined":[10,81,95],"by":[11,57,77,199],"WS\u2010BPEL":[12],"(Web":[13],"Services":[14],"Business":[15],"Process":[16],"Execution":[17],"Language,":[18],"BPEL":[19,47,67,88,121,134,169],"for":[20,85,145],"short)":[21],"scripts,":[22],"in":[23,116,163,171],"particular,":[24],"when":[25],"such":[26],"scripts":[27,89,122,135,170],"defining":[28],"collaborative":[29],"on":[32],"top":[33],"web":[35,70],"services":[36,71],"are":[37,80,98],"deployed":[38],"across":[39],"security":[40,58,78,161,190],"domain":[41],"boundaries.":[42],"Design/methodology/approach":[43],"Analysing":[44],"potential":[45],"define":[49],"behaviour":[50],"violating":[54],"restrictions":[55,75],"implied":[56,76],"policies.":[59],"Findings":[60],"Semantic":[61],"patterns":[62],"combinations":[64],"particular":[66],"features":[68],"and":[69,82,126,140],"with":[72,136,179],"specific":[73],"access":[74],"policies":[79,162],"their":[83],"implications":[84],"analysis":[86],"during":[90],"compliance":[91,175,202],"assessment":[92,203],"cross\u2010domain":[94,194],"identified.":[99],"Research":[100],"limitations/implications":[101],"The":[102,154],"results":[103,155,181],"the":[105,150],"research":[106,118],"part":[107],"which":[109],"is":[110],"reported":[111],"here":[112],"have":[113],"been":[114],"applied":[115],"a":[117],"prototype":[119],"limited":[124],"size":[125,139],"comparatively":[127],"simple":[128],"logic.":[130],"Real\u2010world":[131],"examples":[132],"respect":[137],"complexity":[141],"should":[142],"be":[143,157],"examined":[144],"further":[146],"approving":[147],"suitability":[148],"algorithms":[151],"used.":[152],"Originality/value":[153],"can":[156],"used":[158],"specify":[160],"terms":[164],"security\u2010critical":[166],"order":[172],"facilitate":[174],"assessment.":[176],"In":[177],"conjunction":[178],"other":[180],"this":[183,185],"research,":[184],"will":[186],"help":[187],"overcome":[189],"issues":[191],"arising":[192],"from":[193],"definition":[195],"enabling":[200],"automatic":[201],"prior":[204],"execution.":[206]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
