2015
DOI: 10.1016/j.future.2014.12.009
|View full text |Cite
|
Sign up to set email alerts
|

Secure service composition with information flow control in service clouds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0
2

Year Published

2016
2016
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 23 publications
(16 citation statements)
references
References 20 publications
0
14
0
2
Order By: Relevance
“…This enables the efficient use of network resources, ensuring compliance with the requirements for the reliability and speed of information processing. One of the most promising directions for the development of methods for ICN building is the use of adaptive control methods [7]. At present, the task of studying, analyzing and modelling data flows that arise in the process of operation and interoperability of applications in a network is not formalized and requires developing the models that reflect the information and technical structure of the network and data flows available in ICN.…”
Section: The Analysis Of the Problem And Available Methodsmentioning
confidence: 99%
“…This enables the efficient use of network resources, ensuring compliance with the requirements for the reliability and speed of information processing. One of the most promising directions for the development of methods for ICN building is the use of adaptive control methods [7]. At present, the task of studying, analyzing and modelling data flows that arise in the process of operation and interoperability of applications in a network is not formalized and requires developing the models that reflect the information and technical structure of the network and data flows available in ICN.…”
Section: The Analysis Of the Problem And Available Methodsmentioning
confidence: 99%
“…Xi et al presented a secure LTS‐based model checking approach to evaluate a service chain composition approach. The authors evaluated the proposed approach using the number of the candidate services per verification time using SPIN model checker.…”
Section: Categorizing Of Selected Service Composition Approachesmentioning
confidence: 99%
“…在汇聚层, 主要采用 k-匿名、l-多 样性、差分隐私等方法实现用户敏感信息的隐藏. 在应用层, 主要针对服务过程中的信息隐私保护, 如 位置隐私等; 近年来, 随着服务组合技术的发展, 信息流控制技术被用于信息在不同服务间交互时的 隐私保护 [199] .…”
Section: 隐私保护unclassified