Trustworthy service composition with secure data transmission in sensor networks
暂无分享,去创建一个
[1] Jianfeng Ma,et al. Service Composition in Multi-domain Environment under Time Constraint , 2013, 2013 IEEE 20th International Conference on Web Services.
[2] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[3] Ning Xi,et al. Secure service composition with information flow control in service clouds , 2015, Future Gener. Comput. Syst..
[4] Lei Li,et al. Two-dimensional trust rating aggregations in service-oriented applications , 2011, IEEE Transactions on Services Computing.
[5] Xiuzhen Zhang,et al. A probabilistic method for emerging topic tracking in Microblog stream , 2016, World Wide Web.
[6] Jianfeng Ma,et al. Decentralized Information Flow Verification Framework for the Service Chain Composition in Mobile Computing Environments , 2013, 2013 IEEE 20th International Conference on Web Services.
[7] Xiaohui Liang,et al. SEER: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.
[8] Lei Li,et al. Trust Evaluation in Composite Services Selection and Discovery , 2009, 2009 IEEE International Conference on Services Computing.
[9] Yan Wang,et al. Reputation-Oriented Trustworthy Computing in E-Commerce Environments , 2008, IEEE Internet Computing.
[10] Shiyong Lu,et al. Formal Modeling and Analysis of Scientific Workflows Using Hierarchical State Machines , 2007, Third IEEE International Conference on e-Science and Grid Computing (e-Science 2007).
[11] Chunyan Miao,et al. A Survey of Multi-Agent Trust Management Systems , 2013, IEEE Access.
[12] Jianfeng Ma,et al. A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks , 2017, IEEE Internet of Things Journal.
[13] Melanie Volkamer,et al. Information Flow Control to Secure Dynamic Web Service Composition , 2006, SPC.
[14] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[15] Peng Zhang,et al. Novel silicon-controlled rectifier (SCR) for digital and high-voltage ESD power supply clamp , 2013, Science China Information Sciences.
[16] Jianfeng Ma,et al. Trust-based service composition in multi-domain environments under time constraint , 2014, Science China Information Sciences.
[17] Gerard J. Holzmann,et al. The Model Checker SPIN , 1997, IEEE Trans. Software Eng..
[18] Cécile Paris,et al. A survey of trust in social networks , 2013, CSUR.
[19] Jianfeng Ma,et al. Efficient attribute based sequential aggregate signature for wireless sensor networks , 2014, Int. J. Sens. Networks.
[20] Athman Bouguettaya,et al. RATEWeb: Reputation Assessment for Trust Establishment among Web services , 2009, The VLDB Journal.
[21] Jianfeng Ma,et al. Trustworthy Service Composition in Service-Oriented Mobile Social Networks , 2014, 2014 IEEE International Conference on Web Services.
[22] Rumen Kyusakov,et al. Integration of Wireless Sensor and Actuator Nodes With IT Infrastructure Using Service-Oriented Architecture , 2013, IEEE Transactions on Industrial Informatics.
[23] Eric M. Yeatman,et al. Urban Sensor Data Streams: London 2013 , 2013, IEEE Internet Computing.
[24] Gregor Snelting,et al. Efficient path conditions in dependence graphs for software safety analysis , 2006, TSEM.
[25] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..