default search action
Secure and Trustworthy Service Composition 2014
- Achim D. Brucker, Fabiano Dalpiaz, Paolo Giorgini, Per Håkon Meland, Erkuden Rios:
Secure and Trustworthy Service Composition - The Aniketos Approach. Lecture Notes in Computer Science 8900, Springer 2014, ISBN 978-3-319-13517-5
State of the Art in Secure and Trustworthy Composite Services
- Per Håkon Meland:
Composite Services with Dynamic Behaviour. 1-9 - Per Håkon Meland, Muhammad Asim, Dhouha Ayed, Fabiano Dalpiaz, Edith Felix, Paolo Giorgini, Susana Gonzáles, Brett Lempereur, John Ronan:
Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Research Directions. 10-35 - Konstantinos Giannakakis:
Adopting Existing Communication Platforms for Security Enabling Technologies. 36-49
The Aniketos Platform
- Per Håkon Meland, Erkuden Rios, Vasilis Tountopoulos, Achim D. Brucker:
The Aniketos Platform. 50-62 - Elda Paja, Fabiano Dalpiaz, Paolo Giorgini:
The Socio-technical Security Requirements Modelling Language for Secure Composite Services. 63-78 - Erkuden Rios, Francesco Malmignati, Eider Iturbe, Michela D'Errico, Mattia Salnitri:
From Consumer Requirements to Policies in Secure Services. 79-94
Design-Time Support Framework
- Elda Paja, Mauro Poggianella, Fabiano Dalpiaz, Pierluigi Roberti, Paolo Giorgini:
Security Requirements Engineering with STS-Tool. 95-109 - Achim D. Brucker:
Using SecureBPMN for Modelling Security-Aware Service Compositions. 110-120 - Achim D. Brucker, Francesco Malmignati, Madjid Merabti, Qi Shi, Bo Zhou:
The Aniketos Service Composition Framework - Analysing and Ranking of Secure Services. 121-135 - Achim D. Brucker, Luca Compagna, Pierre Guilleminot:
Compliance Validation of Secure Service Compositions. 136-149 - Hisain Elshaafi, Jimmy McGibney, Dmitri Botvich:
Aggregation and Optimisation of Trustworthiness of Composite Services. 150-172
Run-Time Support Framework
- Brett Lempereur, Dhouha Ayed, Muhammad Asim, Madjid Merabti, Qi Shi:
Monitoring Threats to Composite Services within the Aniketos Run-Time Framework. 173-191 - Muhammad Asim, Artsiom Yautsiukhin, Achim D. Brucker, Brett Lempereur, Qi Shi:
Security Policy Monitoring of Composite Services. 192-202
Case Studies and Evaluation
- Stéphane Paul, Alessandra Tedeschi, Erlend Andreas Gjære, Ivonne A. Herrera:
The Aniketos Design-Time Framework Applied - A Case in Air Traffic Management. 203-218 - Vasilis Tountopoulos, Ira Giannakoudaki, Konstantinos Giannakakis, Lefteris Korres, Leonidas Kallipolitis:
Supporting Security and Trust in Complex e-Government Services. 219-233 - Elke Beck, Sandra Trösterer, Alexander G. Mirnig, Manfred Tscheligi:
Characteristics and Addressed Challenges in Evaluating the Aniketos Project Outcome. 234-246
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.