2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA) 2017
DOI: 10.1109/aiccsa.2017.138
|View full text |Cite
|
Sign up to set email alerts
|

A Personalized On-the-Fly Approach for Secure Semantic Web Services Composition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…The constructed user model allows personalizing the initial user requirement. Referring to the service model, which is detailed in our previous work (Abidi et al , 2017), we have proved that service model allows personalizing the discovery, the realization and the execution steps. Consequently, based on the results introduced in Abidi et al (2017), we have showed that integrating personalization in the whole composition process increases the user requirements.…”
Section: Validationmentioning
confidence: 83%
See 1 more Smart Citation
“…The constructed user model allows personalizing the initial user requirement. Referring to the service model, which is detailed in our previous work (Abidi et al , 2017), we have proved that service model allows personalizing the discovery, the realization and the execution steps. Consequently, based on the results introduced in Abidi et al (2017), we have showed that integrating personalization in the whole composition process increases the user requirements.…”
Section: Validationmentioning
confidence: 83%
“…As mentioned in (Section 2.1), personalization increases the security threats. Thereupon, as a first part of our approach, we have defined user security requirements in the user model (Abidi et al , 2018) and services security requirements in the service model (Abidi et al , 2017). As a second part, we have proposed a service security governance based on GDPR[3] rules, which aim to detect vulnerabilities and enhance the trust.…”
Section: Validationmentioning
confidence: 99%