擦试不掉 发表于 2025-3-28 15:31:21

1865-0929 he papers focus on the following topics: cloud computing fundamentals; services science foundations for cloud computing; cloud computing platforms and applications; cloud computing enabling technologies; and mobile cloud computing services..978-3-319-25413-5978-3-319-25414-2Series ISSN 1865-0929 Series E-ISSN 1865-0937

细胞 发表于 2025-3-28 18:53:51

https://doi.org/10.1007/978-1-4614-5526-4 This paper describes a ontology-based semantic model of privacy requirements along with a logical formalism for mapping SWRL (Semantic Web Rule Language) privacy rules to a policy language that is implementable on clouds environments namely XACML. The underline implementation requirements for our formalism will be also explained.

使无效 发表于 2025-3-29 01:00:49

Quantitative Summary of Research Findings,t quantifies toolkit performance against that of selected alternative toolkits and technologies for service development. Toolkit performance is found to be comparable to or improve upon the performance of evaluated technologies.

packet 发表于 2025-3-29 04:03:15

http://reply.papertrans.cn/23/2285/228446/228446_44.png

萤火虫 发表于 2025-3-29 07:19:25

http://reply.papertrans.cn/23/2285/228446/228446_45.png

DOLT 发表于 2025-3-29 14:12:20

http://reply.papertrans.cn/23/2285/228446/228446_46.png

CODA 发表于 2025-3-29 16:15:36

http://reply.papertrans.cn/23/2285/228446/228446_47.png

comely 发表于 2025-3-29 22:51:54

Semantic Generation of Clouds Privacy Policies This paper describes a ontology-based semantic model of privacy requirements along with a logical formalism for mapping SWRL (Semantic Web Rule Language) privacy rules to a policy language that is implementable on clouds environments namely XACML. The underline implementation requirements for our formalism will be also explained.

Accessible 发表于 2025-3-30 02:24:50

Reducing Complexity in Service Development and Integrationt quantifies toolkit performance against that of selected alternative toolkits and technologies for service development. Toolkit performance is found to be comparable to or improve upon the performance of evaluated technologies.

concert 发表于 2025-3-30 04:26:21

Generating Secure Service Compositionsgives examples of proofs for such patterns. It also presents the process of using SESO patterns to generate secure service compositions and presents the results of an initial experimental evaluation of the approach.
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Cloud Computing and Services Sciences; International Confer Markus Helfert,Frédéric Desprez,Victor Méndez Muno Conference proceedings 2015