使隔离 发表于 2025-3-26 21:02:56

The Aniketos Design-Time Framework Applied – A Case in Air Traffic Managementic Management (ATM) System Wide Information Management (SWIM) system: a meteorological information request from a pilot in an aircraft involving air-ground data-link communications. The scope of the study runs from security requirements elicitation, to the deployment of dummy services implementing t

捏造 发表于 2025-3-27 01:19:50

http://reply.papertrans.cn/87/8634/863334/863334_32.png

Diaphragm 发表于 2025-3-27 08:20:00

Characteristics and Addressed Challenges in Evaluating the Aniketos Project Outcome tasks. We describe the particular characteristics of the Aniketos project evaluation and the overall challenges we encountered during our evaluation tasks. These challenges are structured along four elements of evaluation work; viz., 1) . who were doing evaluation work or benefiting from the findin

Confess 发表于 2025-3-27 12:09:21

From Consumer Requirements to Policies in Secure Servicesrts with the modelling of organisation actors’ objectives and commitments among these actors, and follows with the transformation of such commitments into security elements in the service business process specification and into a consumer security policy which the service will need to be compliant with.

空气 发表于 2025-3-27 15:09:41

http://reply.papertrans.cn/87/8634/863334/863334_35.png

URN 发表于 2025-3-27 21:07:46

http://reply.papertrans.cn/87/8634/863334/863334_36.png

蛰伏 发表于 2025-3-28 01:49:12

Supporting Security and Trust in Complex e-Government Servicesthe Aniketos platform to support the whole data driven secure service development life cycle and ensure trust in service compositions, which can be consumed in value-added public service delivery processes.

通情达理 发表于 2025-3-28 02:49:08

http://reply.papertrans.cn/87/8634/863334/863334_38.png

Keratin 发表于 2025-3-28 06:29:50

Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Researchthreats for composite services in the Future Internet, which organises thirty-two threats within seven categories, and a corresponding taxonomy of thirty-three countermeasures. These results have been devised from analysing service scenarios and their possible abuse with participants from seventeen organisations from industry and academia.

不在灌木丛中 发表于 2025-3-28 14:19:49

http://reply.papertrans.cn/87/8634/863334/863334_40.png
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Secure and Trustworthy Service Composition; The Aniketos Approac Achim D. Brucker,Fabiano Dalpiaz,Erkuden Rios Book 2014 Springer Internati