The challenges of secure and trustworthy service composition in the Future Internet
暂无分享,去创建一个
[1] Qi Shi,et al. System-of-systems boundary check in a public event scenario , 2010, 2010 5th International Conference on System of Systems Engineering.
[2] Madjid Merabti,et al. A Framework for Providing a Secure System of Systems Composition , 2011 .
[3] Jan Schaffner,et al. Mixed initiative use cases for semi-automated service composition: a survey , 2006, SOSE '06.
[4] Alessandro Armando,et al. Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps , 2008, FMSE '08.
[5] Mohsen Guizani,et al. NIS01-4: Trust Aware Routing in Mobile Ad Hoc Networks , 2006, IEEE Globecom 2006.
[6] Gian Luigi Ferrari,et al. Enforcing secure service composition , 2005, 18th IEEE Computer Security Foundations Workshop (CSFW'05).
[7] Fabio Martinelli,et al. Secure Service Composition with Symbolic Effects , 2009, 2009 Fourth South-East European Workshop on Formal Methods.
[8] Ulrich Lang,et al. Model Driven Development of Security Aspects , 2007, Electron. Notes Theor. Comput. Sci..
[9] Guisheng Fan,et al. Aspect Oriented Approach to Building Secure Service Composition , 2010, 2010 Asia Pacific Software Engineering Conference.
[10] Nicola Zannone. The Si* Modeling Framework: Metamodel and Applications , 2009, Int. J. Softw. Eng. Knowl. Eng..
[11] David Llewellyn-Jones,et al. A Reputation Based Scheme to Deter Identity Based Attacks for Clustered MANETs , 2009 .
[12] Fabio Massacci,et al. Extending Security-by-Contract with Quantitative Trust on Mobile Devices , 2010, 2010 International Conference on Complex, Intelligent and Software Intensive Systems.
[13] Rajeev Motwani,et al. The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.
[14] Eric Dubois,et al. Towards a Decision Model Based on Trust and Security Risk Management , 2009, AISC.
[15] Inger Anne Tøndel,et al. An Architectural Foundation for Security Model Sharing and Reuse , 2009, 2009 International Conference on Availability, Reliability and Security.
[16] Peter A. Jarvis,et al. PASSAT: A User-centric Planning Framework , 2002 .
[17] Yuan Gao,et al. A Routing Protocol Based on Trust for MANETs , 2005, GCC.