![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Secure and Trustworthy Service Composition 2014
- Achim D. Brucker
, Fabiano Dalpiaz, Paolo Giorgini
, Per Håkon Meland, Erkuden Rios
:
Secure and Trustworthy Service Composition - The Aniketos Approach. Lecture Notes in Computer Science 8900, Springer 2014, ISBN 978-3-319-13517-5
State of the Art in Secure and Trustworthy Composite Services
- Per Håkon Meland:
Composite Services with Dynamic Behaviour. 1-9 - Per Håkon Meland, Muhammad Asim
, Dhouha Ayed, Fabiano Dalpiaz, Edith Felix, Paolo Giorgini
, Susana Gonzáles, Brett Lempereur, John Ronan
:
Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Research Directions. 10-35 - Konstantinos Giannakakis:
Adopting Existing Communication Platforms for Security Enabling Technologies. 36-49
The Aniketos Platform
- Per Håkon Meland, Erkuden Rios
, Vasilis Tountopoulos, Achim D. Brucker
:
The Aniketos Platform. 50-62 - Elda Paja, Fabiano Dalpiaz, Paolo Giorgini
:
The Socio-technical Security Requirements Modelling Language for Secure Composite Services. 63-78 - Erkuden Rios
, Francesco Malmignati, Eider Iturbe
, Michela D'Errico, Mattia Salnitri:
From Consumer Requirements to Policies in Secure Services. 79-94
Design-Time Support Framework
- Elda Paja, Mauro Poggianella, Fabiano Dalpiaz, Pierluigi Roberti, Paolo Giorgini
:
Security Requirements Engineering with STS-Tool. 95-109 - Achim D. Brucker
:
Using SecureBPMN for Modelling Security-Aware Service Compositions. 110-120 - Achim D. Brucker
, Francesco Malmignati, Madjid Merabti, Qi Shi, Bo Zhou:
The Aniketos Service Composition Framework - Analysing and Ranking of Secure Services. 121-135 - Achim D. Brucker
, Luca Compagna, Pierre Guilleminot:
Compliance Validation of Secure Service Compositions. 136-149 - Hisain Elshaafi, Jimmy McGibney, Dmitri Botvich:
Aggregation and Optimisation of Trustworthiness of Composite Services. 150-172
Run-Time Support Framework
- Brett Lempereur, Dhouha Ayed, Muhammad Asim
, Madjid Merabti, Qi Shi:
Monitoring Threats to Composite Services within the Aniketos Run-Time Framework. 173-191 - Muhammad Asim
, Artsiom Yautsiukhin
, Achim D. Brucker
, Brett Lempereur, Qi Shi:
Security Policy Monitoring of Composite Services. 192-202
Case Studies and Evaluation
- Stéphane Paul, Alessandra Tedeschi, Erlend Andreas Gjære, Ivonne A. Herrera:
The Aniketos Design-Time Framework Applied - A Case in Air Traffic Management. 203-218 - Vasilis Tountopoulos, Ira Giannakoudaki, Konstantinos Giannakakis, Lefteris Korres, Leonidas Kallipolitis:
Supporting Security and Trust in Complex e-Government Services. 219-233 - Elke Beck, Sandra Trösterer, Alexander G. Mirnig
, Manfred Tscheligi
:
Characteristics and Addressed Challenges in Evaluating the Aniketos Project Outcome. 234-246
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.