Secure and Trustworthy Service Composition The Aniketos Approach / [electronic resource] :
edited by Achim D. Brucker, Fabiano Dalpiaz, Paolo Giorgini, Per Håkon Meland, Erkuden Rios.
- Cham : Springer International Publishing, 2014.
- 1 online resource (X, 247 p. 92 ill.)
- Lecture Notes in Computer Science, 8900 0302-9743 ; .
Composite Services with Dynamic Behaviour -- Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Research Directions -- Adopting Existing Communication Platforms for Security Enabling Technologies -- The Aniketos Platform -- The Socio-technical Security Requirements Modelling Language for Secure Composite Services -- From Consumer Requirements to Policies in Secure Services -- Security Requirements Engineering with STS-Tool -- Using SecureBPMN for Modelling Security-Aware Service Compositions -- The Aniketos Service Composition Framework: Analysing and Ranking of Secure Services -- Compliance Validation of Secure Service Compositions -- Aggregation and Optimisation of Trustworthiness of Composite Services -- Monitoring Threats to Composite Services within the Aniketos Run-Time Framework -- Security Policy Monitoring of Composite Services -- The Aniketos Design-Time Framework Applied - A Case in Air Traffic Management -- Supporting Security and Trust in Complex e-Government Services -- Characteristics and Addressed Challenges in Evaluating the Aniketos Project Outcome.
9783319135182
Computer science. Information technology. Business--Data processing. Computer communication systems. Software engineering. Computer security.