Secure and Trustworthy Service Composition: The Aniketos Approach

被引:0
|
作者
Brucker, Achim D. [1 ]
Dalpiaz, Fabiano [2 ]
Giorgini, Paolo [3 ]
Meland, Per HåKon [4 ]
Rios, Erkuden [5 ]
机构
[1] SAP SE, Vincenz-Priessnitz-Str. 1, Karlsruhe, Germany
[2] Utrecht University, PO Box 80.089, TB Utrecht, Netherlands
[3] University of Trento, DISI, Via Sommarive 5, Povo Trento, Italy
[4] SINTEF ICT, Strindveien 4, Trondheim, Norway
[5] Parque Tecnológico de Bizkaia, Edificio 202, Zamudio, Spain
关键词
D O I
10.1007/978-3-319-13518-2
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] A trustworthy web service composition method for ubiquitous computing
    Zhao, Shenghui
    Chen, Guilin
    Wang, Huibin
    Chen, Haibao
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2017, 26 (01) : 44 - 55
  • [22] Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet
    Jiang, Tao
    Chen, Xiaofeng
    Li, Jin
    Ma, Jianfeng
    JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 277 - 289
  • [23] A trustworthy Reputation Approach for Web Service Discovery
    El-Kafrawy, Passent
    Elabd, Emad
    Fathi, Hanaa
    INTERNATIONAL CONFERENCE ON COMMUNICATIONS, MANAGEMENT, AND INFORMATION TECHNOLOGY (ICCMIT'2015), 2015, 65 : 572 - 581
  • [24] Trustworthy service selection and composition - Reducing the entropy of service-oriented Web
    Liu, W
    2005 3RD IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2005, : 104 - 109
  • [25] Modular Plans for Secure Service Composition
    Costa, Gabriele
    Degano, Pierpaolo
    Martinelli, Fabio
    AUTOMATED REASONING FOR SECURITY PROTOCOL ANALYSIS AND ISSUES IN THE THEORY OF SECURITY, 2010, 6186 : 41 - +
  • [26] Modular plans for secure service composition
    Costa, Gabriele
    Degano, Pierpaolo
    Martinelli, Fabio
    JOURNAL OF COMPUTER SECURITY, 2012, 20 (01) : 81 - 117
  • [27] SECURE SERVICE COMPOSITION IN SENSOR WEB
    Yu, Genong
    Di, Liping
    2009 IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM, VOLS 1-5, 2009, : 3882 - 3885
  • [28] Dynamic evolution mechanism for trustworthy software based on service composition
    Zeng J.
    Sun H.-L.
    Liu X.-D.
    Deng T.
    Huai J.-P.
    Ruan Jian Xue Bao/Journal of Software, 2010, 21 (02): : 261 - 276
  • [29] STBM: secure and trustworthy blockchain-based model for cybersecurity service transactions
    Piao, Guirong
    Zhu, Jianming
    Tongxin Xuebao/Journal on Communications, 2024, 45 (09): : 68 - 81
  • [30] An agent-based approach for trustworthy service location
    Yolum, P
    Singh, MP
    AGENTS AND PEER-TO-PEER COMPUTING, 2003, 2530 : 45 - 56