Security management mechanism for composite applications based on hash chains | IEEE Conference Publication | IEEE Xplore