期刊
![](https://www.cnblogs.com/Emoticons/msn/beer_mug.gif)
Wu, Min.
Role-based access control for web services, WSEAS Transactions on Information Science and Applications, 2006
![](https://www.cnblogs.com/Emoticons/msn/beer_mug.gif)
Bertino, Elisa. An Adaptive Access Control Model for Web Services. IJWSR, 2006
![](https://www.cnblogs.com/Emoticons/msn/beer_mug.gif)
Coetzee, M.
An access control framework for web services, Information Management and Computer Security, 2005
![](https://www.cnblogs.com/Emoticons/msn/beer_mug.gif)
刘必欣 王玉峰 贾焰 吴泉源. 一种基于角色的分布式动态服务组合方法. 软件学报, 2005
![](https://www.cnblogs.com/Emoticons/msn/beer_mug.gif)
Yee, George O.M., Korba, Larry. Security Personalization for Internet and Web Services, International Journal of Web Services Research, 2008
![](https://www.cnblogs.com/Emoticons/msn/beer_mug.gif)
Bartoletti, Massimo. Semantics-based design for secure web services, IEEE Transactions on Software Engineering, 2008
会议
![](https://www.cnblogs.com/Emoticons/msn/beer_mug.gif)
Jeffrey Fischer, Rupak Majumdar, "
A Theory of Role Composition," ICWS, 2008
![](https://www.cnblogs.com/Emoticons/msn/beer_mug.gif)
Mudhakar Srivatsa, Arun Iyengar, Thomas Mikalsen, Isabelle Rouvellou, Jian Yin, "
An Access Control System for Web Service Compositions," ICWS 2007
![](https://www.cnblogs.com/Emoticons/msn/beer_mug.gif)
L Singaravelu. Fine-grain, end-to-end security for web service compositions. SCC, 2007
![](https://www.cnblogs.com/Emoticons/msn/beer_mug.gif)
Marijke Coetzee. A Trust and Context Aware Access Control Model for Web Services Conversations. LNCS 2007
![](https://www.cnblogs.com/Emoticons/msn/beer_mug.gif)
M Mecella, M Ouzzani, F Paci, E Bertino. Access control enforcement for conversation-based web services. WWW 2006
![](https://www.cnblogs.com/Emoticons/msn/beer_mug.gif)
Yuan, E. Tong, J. Attributed based access control (ABAC) for Web services. ICWS 2005
![](https://www.cnblogs.com/Emoticons/msn/beer_mug.gif)
Carminati, B.
Web Service Composition: A Security Perspective. WIRI, 2005 (gs:11)
![](https://www.cnblogs.com/Emoticons/msn/beer_mug.gif)
Roosdiana Wonohoesodo, Zahir Tari, "
A Role based Access Control for Web Services," SCC 04
![](https://www.cnblogs.com/Emoticons/msn/beer_mug.gif)
Sudhir Agarwal. Access Control for Semantic Web Services. ICWS2004
![](https://www.cnblogs.com/Emoticons/msn/beer_mug.gif)
Bhatti R, Bertino E, Ghafoor A. A trust-based context-aware access control model for Web-services. ICWS 2004
![](https://www.cnblogs.com/Emoticons/msn/beer_mug.gif)
Hristo Koshutanski. An access control framework for business processes for web services. ACM workshop on XML security. 2003
![](https://www.cnblogs.com/Emoticons/msn/beer_mug.gif)
Satoh, Fumiko. Security policy composition for composite services, ICWE, 2008
![](https://www.cnblogs.com/Emoticons/msn/beer_mug.gif)
Xu, Dong-Hong, An improved calculus for secure dynamic services composition, COMPSAC 2008
![](https://www.cnblogs.com/Emoticons/msn/beer_mug.gif)
Chollet, Stéphanie. Security specification at process level, SCC2008
![](https://www.cnblogs.com/Emoticons/msn/beer_mug.gif)
Chevalier, Yannick. Automatic composition of services with security policies, SERVICES 2008
![](https://www.cnblogs.com/Emoticons/msn/beer_mug.gif)
Barbara Carminati. "Security Conscious Web Service Composition with Semantic Web Support," icdew, 2007
![](https://www.cnblogs.com/Emoticons/msn/beer_mug.gif)
Barbara Carminati. Security Conscious Web Service Composition. ICWS 2006
![](https://www.cnblogs.com/Emoticons/msn/beer_mug.gif)
Lee, Adam J. Defeasible security policy composition for web services, 4th ACM Workshop on Formal Methods in Security Engineering, 2006