2012 International Conference on Innovations in Information Technology (IIT) 2012
DOI: 10.1109/innovations.2012.6207773
|View full text |Cite
|
Sign up to set email alerts
|

Security oriented service composition: A framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0
1

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 9 publications
0
7
0
1
Order By: Relevance
“…Tradicinės ir visuotinės kokybės vadybos skirtumai (Khan 2006a) inžinerinių ar gamybos strategijų. Kompanijos išlaidos mažinamos pašalinant paslaugos ar produkto gamybos metu kylančias klaidas, defektus ir nuostolius (Khan 2006b). Paslaugų sektoriuje lyginamoji analizė yra gerosios praktikos paieškos, kurios tolimesnis pritaikymas lemia išskirtinai gerą paslaugos suteikimą, taikant geriausią paslaugų tiekimo strategiją (Ben-Daya et al 2000).…”
Section: Vadybos Teorijų Vaidmuo Darbo Efektyvumui Laiduotiunclassified
“…Tradicinės ir visuotinės kokybės vadybos skirtumai (Khan 2006a) inžinerinių ar gamybos strategijų. Kompanijos išlaidos mažinamos pašalinant paslaugos ar produkto gamybos metu kylančias klaidas, defektus ir nuostolius (Khan 2006b). Paslaugų sektoriuje lyginamoji analizė yra gerosios praktikos paieškos, kurios tolimesnis pritaikymas lemia išskirtinai gerą paslaugos suteikimą, taikant geriausią paslaugų tiekimo strategiją (Ben-Daya et al 2000).…”
Section: Vadybos Teorijų Vaidmuo Darbo Efektyvumui Laiduotiunclassified
“…Other work on service composition focuses on discovering services that have given security properties (e.g., [3,5,15,16,19]). Some of these approaches focus on specific types of security properties (e.g., [16,19]) whilst other focus on how to express and check security properties but only for single partner services of a composition (e.g., [3,5,15]).…”
Section: Related Workmentioning
confidence: 99%
“…Another strand of work on automatic service composition focuses on discovering services that can guarantee given security properties (Carminati et al, 2006;Medjahed et al, 2003;Lelarge et al, 2006;Anisetti et al, 2013;Khan et al, 2012). Some of these approaches focus on specific types of security properties (Medjahed et al, 2003;Lelarge et al, 2006), whilst others (Carminati et al, 2006;Anisetti et al, 2013;Khan et al, 2012) focus on how to express and check security properties only for single partner services of a composition.…”
Section: Related Workmentioning
confidence: 99%
“…Some of these approaches focus on specific types of security properties (Medjahed et al, 2003;Lelarge et al, 2006), whilst others (Carminati et al, 2006;Anisetti et al, 2013;Khan et al, 2012) focus on how to express and check security properties only for single partner services of a composition. In contrast, our approach can support arbitrary security properties and properties of entire service compositions.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation