{"id":"https://openalex.org/W1968579769","doi":"https://doi.org/10.1145/1180367.1180386","title":"A comprehensive security architecture for dynamic, web service based virtual organizations for businesses","display_name":"A comprehensive security architecture for dynamic, web service based virtual organizations for businesses","publication_year":2006,"publication_date":"2006-11-03","ids":{"openalex":"https://openalex.org/W1968579769","doi":"https://doi.org/10.1145/1180367.1180386","mag":"1968579769"},"language":"en","primary_location":{"id":"doi:10.1145/1180367.1180386","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1180367.1180386","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd ACM workshop on Secure web services","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023171391","display_name":"Rafael Deitos","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Rafael Deitos","raw_affiliation_strings":["SAP Research, Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"SAP Research, Karlsruhe, Germany","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103389585","display_name":"Florian Kerschbaum","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Florian Kerschbaum","raw_affiliation_strings":["SAP Research, Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"SAP Research, Karlsruhe, Germany","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090972494","display_name":"Philip Robinson","orcid":"https://orcid.org/0000-0002-1236-9505"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Philip Robinson","raw_affiliation_strings":["SAP Research, Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"SAP Research, Karlsruhe, Germany","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5023171391"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.0322,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.92225773,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"103","last_page":"104"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6798995137214661},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.6298626661300659},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5693490505218506},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.5578725934028625},{"id":"https://openalex.org/keywords/enterprise-information-security-architecture","display_name":"Enterprise information security architecture","score":0.5130552053451538},{"id":"https://openalex.org/keywords/service-oriented-architecture","display_name":"Service-oriented architecture","score":0.5021862983703613},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.4753446578979492},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4518038332462311},{"id":"https://openalex.org/keywords/distributed-system-security-architecture","display_name":"Distributed System Security Architecture","score":0.4364948868751526},{"id":"https://openalex.org/keywords/sherwood-applied-business-security-architecture","display_name":"Sherwood Applied Business Security Architecture","score":0.4298717677593231},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.39476022124290466},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.37766844034194946},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.32350262999534607},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.26206520199775696},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.25503894686698914},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.24900737404823303},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.23120510578155518},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.20410707592964172},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.13839691877365112},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.0915849506855011}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6798995137214661},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.6298626661300659},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5693490505218506},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.5578725934028625},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.5130552053451538},{"id":"https://openalex.org/C57041688","wikidata":"https://www.wikidata.org/wiki/Q220644","display_name":"Service-oriented architecture","level":3,"score":0.5021862983703613},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.4753446578979492},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4518038332462311},{"id":"https://openalex.org/C77290126","wikidata":"https://www.wikidata.org/wiki/Q5283128","display_name":"Distributed System Security Architecture","level":5,"score":0.4364948868751526},{"id":"https://openalex.org/C60172848","wikidata":"https://www.wikidata.org/wiki/Q7495506","display_name":"Sherwood Applied Business Security Architecture","level":5,"score":0.4298717677593231},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.39476022124290466},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.37766844034194946},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.32350262999534607},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.26206520199775696},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.25503894686698914},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.24900737404823303},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.23120510578155518},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.20410707592964172},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.13839691877365112},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0915849506855011},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1180367.1180386","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1180367.1180386","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd ACM workshop on Secure web services","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1566022718","https://openalex.org/W1575174395","https://openalex.org/W1608617377","https://openalex.org/W1650233843","https://openalex.org/W1713323079","https://openalex.org/W1998410860","https://openalex.org/W2022914387","https://openalex.org/W2071705909","https://openalex.org/W2107016517","https://openalex.org/W2126848481","https://openalex.org/W2147986718","https://openalex.org/W2154010459","https://openalex.org/W2157689518","https://openalex.org/W2166602595","https://openalex.org/W2187360174","https://openalex.org/W2439240014","https://openalex.org/W2585600646","https://openalex.org/W2738444131"],"related_works":["https://openalex.org/W2379201401","https://openalex.org/W2076689609","https://openalex.org/W3177693645","https://openalex.org/W1983407603","https://openalex.org/W198076453","https://openalex.org/W2515916393","https://openalex.org/W2367788936","https://openalex.org/W2500884629","https://openalex.org/W2998865675","https://openalex.org/W4200137140"],"abstract_inverted_index":{"In":[0],"this":[1],"paper":[2],"we":[3,16],"propose":[4],"a":[5,43],"security":[6,36,56],"architecture":[7,37,73],"for":[8,11,46],"Virtual":[9,14],"Organizations":[10,15],"businesses.":[12],"The":[13,35],"consider":[17],"are":[18,24],"based":[19,49],"on":[20,50],"web":[21],"servicetechnology,":[22],"and":[23],"dynamic,":[25],"i.e.":[26],"their":[27],"membership":[28],"may":[29],"change":[30],"frequently":[31],"throughout":[32],"its":[33],"lifetime.":[34],"advances":[38],"over":[39,63],"previous":[40],"approaches":[41],"with":[42],"new":[44],"approach":[45],"distributed":[47],"administration":[48],"policy":[51],"generation":[52],"which":[53],"allows":[54],"local":[55],"administrators":[57],"to":[58],"remain":[59],"in":[60,74],"complete":[61],"control":[62],"the":[64,69,75],"policies":[65],"deployed.":[66],"We":[67],"show":[68],"advantages":[70],"of":[71,77],"our":[72],"case":[76],"member":[78],"replacement.":[79]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
