Image from Google Jackets

Secure and Trustworthy Service Composition [electronic resource] : The Aniketos Approach / edited by Achim D. Brucker, Fabiano Dalpiaz, Paolo Giorgini, Per Håkon Meland, Erkuden Rios.

Contributor(s): Material type: TextTextLanguage: English Series: Lecture Notes in Computer Science ; 8900Publication details: Cham : Springer International Publishing, 2014.Description: 1 online resource (X, 247 p. 92 ill.)ISBN:
  • 9783319135182
Subject(s): Online resources:
Contents:
Composite Services with Dynamic Behaviour -- Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Research Directions -- Adopting Existing Communication Platforms for Security Enabling Technologies -- The Aniketos Platform -- The Socio-technical Security Requirements Modelling Language for Secure Composite Services -- From Consumer Requirements to Policies in Secure Services -- Security Requirements Engineering with STS-Tool -- Using SecureBPMN for Modelling Security-Aware Service Compositions -- The Aniketos Service Composition Framework: Analysing and Ranking of Secure Services -- Compliance Validation of Secure Service Compositions -- Aggregation and Optimisation of Trustworthiness of Composite Services -- Monitoring Threats to Composite Services within the Aniketos Run-Time Framework -- Security Policy Monitoring of Composite Services -- The Aniketos Design-Time Framework Applied - A Case in Air Traffic Management -- Supporting Security and Trust in Complex e-Government Services -- Characteristics and Addressed Challenges in Evaluating the Aniketos Project Outcome.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Materials specified Status Date due Barcode Item holds
Books Books National Library of India Available EBK000024784ENG
Total holds: 0

Composite Services with Dynamic Behaviour -- Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Research Directions -- Adopting Existing Communication Platforms for Security Enabling Technologies -- The Aniketos Platform -- The Socio-technical Security Requirements Modelling Language for Secure Composite Services -- From Consumer Requirements to Policies in Secure Services -- Security Requirements Engineering with STS-Tool -- Using SecureBPMN for Modelling Security-Aware Service Compositions -- The Aniketos Service Composition Framework: Analysing and Ranking of Secure Services -- Compliance Validation of Secure Service Compositions -- Aggregation and Optimisation of Trustworthiness of Composite Services -- Monitoring Threats to Composite Services within the Aniketos Run-Time Framework -- Security Policy Monitoring of Composite Services -- The Aniketos Design-Time Framework Applied - A Case in Air Traffic Management -- Supporting Security and Trust in Complex e-Government Services -- Characteristics and Addressed Challenges in Evaluating the Aniketos Project Outcome.

There are no comments on this title.

to post a comment.
                                                                           
web counter

Copyright ©2020 The National Library of India, Govt. of India ↔ Hosted by NVLI, MOC ↔ Technology and Design by National Library of India, Ministry of Culture, Govt. of India