Secure and Trustworthy Service Composition: The Aniketos Approach

被引:0
|
作者
Brucker, Achim D. [1 ]
Dalpiaz, Fabiano [2 ]
Giorgini, Paolo [3 ]
Meland, Per HåKon [4 ]
Rios, Erkuden [5 ]
机构
[1] SAP SE, Vincenz-Priessnitz-Str. 1, Karlsruhe, Germany
[2] Utrecht University, PO Box 80.089, TB Utrecht, Netherlands
[3] University of Trento, DISI, Via Sommarive 5, Povo Trento, Italy
[4] SINTEF ICT, Strindveien 4, Trondheim, Norway
[5] Parque Tecnológico de Bizkaia, Edificio 202, Zamudio, Spain
关键词
D O I
10.1007/978-3-319-13518-2
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Is secure instant messaging trustworthy?
    Bolcer, GA
    COMMUNICATIONS NEWS, 2002, 39 (12): : 9 - 9
  • [32] Secure service composition with information flow control in service clouds
    Xi, Ning
    Sun, Cong
    Ma, Jianfeng
    Shen, Yulong
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 49 : 142 - 148
  • [33] Secure Web Service Composition with Untrusted Broker
    Carminati, Barbara
    Ferrari, Elena
    Ngoc Hong Tran
    2014 IEEE 21ST INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2014), 2014, : 137 - 144
  • [34] Validating trustworthy service composition through VIPLE and pi-calculus
    Zhao S.
    Li Y.
    Wang Y.
    Chen Y.
    International Journal of Simulation and Process Modelling, 2020, 15 (1-2) : 76 - 88
  • [35] An Approach to Constructing User-constrained Trustworthy Service Flow
    Liu Yang
    Miao Huaikou
    Ma Yan
    CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (03): : 425 - 431
  • [36] QnQ: Quality and Quantity Based Unified Approach for Secure and Trustworthy Mobile Crowdsensing
    Bhattacharjee, Shameek
    Ghosh, Nirnay
    Shah, Vijay K.
    Das, Sajal K.
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2020, 19 (01) : 200 - 216
  • [37] A general approach to secure components composition
    Shi, Q
    Zhang, N
    IEEE HIGH-ASSURANCE SYSTEMS ENGINEERING WORKSHOP, PROCEEDINGS, 1997, : 263 - 270
  • [38] Special Issue on Secure and Trustworthy Computing
    Sinanoglu, Ozgur
    Karri, Ramesh
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2016, 13 (01)
  • [39] Trustworthy ICs for secure embedded computing
    Cheng, Tim
    IEEE DESIGN & TEST OF COMPUTERS, 2007, 24 (06): : 516 - 516
  • [40] M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet
    Jiang, Tao
    Chen, Xiaofeng
    Li, Jin
    Ma, Jianfeng
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 612 - 621