2018
DOI: 10.1016/j.procs.2018.08.015
|View full text |Cite
|
Sign up to set email alerts
|

Refined cloud services discovery based on user model including privacy-preserving access control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
1
1

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…Based on PASCO framework and referring to the evaluation result presented in (Section 4), our aim is to introduce personalization in the whole WSC process. As personalization is identified through the user and the service models, we have explained in our previous work (Abidi et al , 2018) that the user model construction step is the key for refined cloud services discovery.…”
Section: Validationmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on PASCO framework and referring to the evaluation result presented in (Section 4), our aim is to introduce personalization in the whole WSC process. As personalization is identified through the user and the service models, we have explained in our previous work (Abidi et al , 2018) that the user model construction step is the key for refined cloud services discovery.…”
Section: Validationmentioning
confidence: 99%
“…As mentioned in (Section 2.1), personalization increases the security threats. Thereupon, as a first part of our approach, we have defined user security requirements in the user model (Abidi et al , 2018) and services security requirements in the service model (Abidi et al , 2017). As a second part, we have proposed a service security governance based on GDPR[3] rules, which aim to detect vulnerabilities and enhance the trust.…”
Section: Validationmentioning
confidence: 99%
“…Nowadays, we find a large number of services available on the Web and in different directories, where a Web service is an application made available on internet. These services are generally defined by their function, input/output [1][2][3], which allow their reuse. However, user requirements are continually evolving, so the available services can not meet all needs especially the most complex ones.…”
Section: Introductionmentioning
confidence: 99%