2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN) 2012
DOI: 10.1109/cason.2012.6412401
|View full text |Cite
|
Sign up to set email alerts
|

Ontology-based Negotiation of security requirements in cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…Since the match is not Perfect, the client is required to provide additional information or negotiate with the service provider before actually invoking the service. Further details on the negotiation phase that may carried out at this step can be found in [23].…”
Section: Service Capabilities Versus Requestor Requirementsmentioning
confidence: 99%
“…Since the match is not Perfect, the client is required to provide additional information or negotiate with the service provider before actually invoking the service. Further details on the negotiation phase that may carried out at this step can be found in [23].…”
Section: Service Capabilities Versus Requestor Requirementsmentioning
confidence: 99%
“…1 ----9 ACM 11 [253] ----1 1 10 ACM 13 [181] 1 --1 -11 ACM 14 [144] 1 1 1 1 -4 12 ACM 16 [28] 1 1 1 1 -13 ACM 17 [53] 1 ----1 14 ACM 18 [262] 1 ----15 ACM 19 [168] 1 ----1 16 ACM 22 [226] 1 1 -1 -17 ACM 23 [176] 1 --1 1 3 18 ACM 24 [227] -----19 ACM 26 [157] 1 ----1 20 ACM 28 [206] -----21 ACM 30 [258] 1 1 -1 -3 22 ACM 32 [5] 1 1 ---23 ACM 34 [80] ------24 ACM 35 [211] 1 1 1 1 -25 ACM 36 [22] --1 --1 26 ACM 37 [54] -----27 ACM 40 [248] 1 1 1 -1 4 28 IEEE 03 [142] 1 1 ---29 IEEE 09 [193] 1 --1 -2 30 IEEE 11 [151] 1 ----31 IEEE 12 [221] 1 1 1 1 1 5 32 IEEE 13 [56] -1 ---33 IEEE 14 [259] 1 ---1 2 34 IEEE 15 [235] 1 1 1 -1 35 IEEE 18 [223] 1 1 -1 -3 36 IEEE 19 [86] 1 1 ---37 IEEE 21 [249] 1 -1 1 -3 38 IEEE 25 [44] 1 --1 1 39 IEEE 26 [4] -----0 40 IEEE 28 [52] 1 ----41 IEEE 30 [160] 1 --1 -2 42 IEEE 33 [95] -----43 IEEE 35 [39] 1 1 -1 -3 44 IEEE 36 [209] 1 ----45 IEEE 38 [147] 1 --1 -2 46 IEEE 41 [96] 1 ----47 IEEE 42 [82] 1 --1 1 3 48 IEEE 48 [50] 1 --1 -49 IEEE 49 [21] 1 ---1 2 50 IEEE 50 [100] 1 1 1 1 1 51 IEEE 51 [110] 1 1 1 --3 52 IEEE 52 [105] 1 ----53 IEEE 54 [25] 1 --1 1 3 54 IEEE 56…”
Section: Signal Processing (Dsp) 2013 18th Internationalmentioning
confidence: 99%
“…Since the match is not Perfect, the client is required to provide additional information or negotiate with the service provider before actually invoking the service. Further details on the negotiation phase that may carried out at this step can be found in (Liccardo et al, 2012).…”
Section: Service Capabilities Versus Requestor Requirementsmentioning
confidence: 99%