A Model for Reasoning About the Privacy Impact of Composite Service Execution in Pervasive Computing
暂无分享,去创建一个
[1] Valérie Issarny,et al. COCOA: COnversation-based service COmposition in pervAsive computing environments with QoS support , 2007, J. Syst. Softw..
[2] Philippe Golle,et al. Revisiting the uniqueness of simple demographics in the US population , 2006, WPES '06.
[3] Rino Falcone,et al. A Fuzzy Approach to a Belief-Based Trust Computation , 2002, Trust, Reputation, and Security.
[4] Jan H. P. Eloff,et al. Separation of duties for access control enforcement in workflow environments , 2001, IBM Syst. J..
[5] Amit P. Sheth,et al. Enhancing Web Services Description and Discovery to Facilitate Composition , 2004, SWSWPC.
[6] Robert O'Harrow,et al. No place to hide , 1997, Science.
[7] Bart Kosko,et al. Fuzzy Cognitive Maps , 1986, Int. J. Man Mach. Stud..
[8] Michael N. Vrahatis,et al. A first study of fuzzy cognitive maps learning using particle swarm optimization , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..
[9] Jiho Choi,et al. Using fuzzy cognitive map for the relationship management in airline service , 2004, Expert Syst. Appl..
[10] C. Carlsson,et al. Adaptive Fuzzy Cognitive Maps for Hyperknowledge Representation in Strategy Formation Process , 1996 .
[11] Masafumi Hagiwara. Extended Fuzzy Cognitive Maps , 1994 .
[12] Karl Perusich,et al. Fuzzy cognitive maps for policy analysis , 1996, 1996 International Symposium on Technology and Society Technical Expertise and Public Decisions. Proceedings.
[13] Wil M.P. van der Aalst,et al. YAWL: yet another workflow language , 2005, Inf. Syst..
[14] Munindar P. Singh,et al. Service-Oriented Computing: Semantics, Processes, Agents , 2010 .
[15] Elisa Bertino,et al. State-of-the-art in privacy preserving data mining , 2004, SGMD.
[16] Bart Kosko,et al. Virtual Worlds as Fuzzy Cognitive Maps , 1993, Presence: Teleoperators & Virtual Environments.
[17] Bart Kosko,et al. Neural networks and fuzzy systems: a dynamical systems approach to machine intelligence , 1991 .
[18] Henrik Stormer,et al. Modeling and Analyzing Separation of Duties in Workflow Environments , 2001, SEC.
[19] James A. Hendler,et al. Semi-automatic Composition ofWeb Services using Semantic Descriptions , 2003, WSMAI.
[20] Ting Yu,et al. An identifiability-based access control model for privacy protection in open systems , 2004, WPES '04.
[21] Sunil Chandra,et al. Orchestrating composite Web services under data flow constraints , 2005, IEEE International Conference on Web Services (ICWS'05).
[22] Chrysostomos D. Stylios,et al. Fuzzy Cognitive Maps in modeling supervisory control systems , 2000, J. Intell. Fuzzy Syst..