BibTeX record series/lncs/MelandAADFGGLR14

download as .bib file

@incollection{DBLP:series/lncs/MelandAADFGGLR14,
  author    = {Per H{\aa}kon Meland and
               Muhammad Asim and
               Dhouha Ayed and
               Fabiano Dalpiaz and
               Edith Felix and
               Paolo Giorgini and
               Susana Gonz{\'{a}}les and
               Brett Lempereur and
               John Ronan},
  title     = {Security and Trustworthiness Threats to Composite Services: Taxonomy,
               Countermeasures, and Research Directions},
  booktitle = {Secure and Trustworthy Service Composition - The Aniketos Approach},
  pages     = {10--35},
  year      = {2014},
  crossref  = {DBLP:series/lncs/8900},
  url       = {https://doi.org/10.1007/978-3-319-13518-2\_2},
  doi       = {10.1007/978-3-319-13518-2\_2},
  timestamp = {Fri, 09 Jun 2017 11:04:34 +0200},
  biburl    = {https://dblp.org/rec/bib/series/lncs/MelandAADFGGLR14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/lncs/8900,
  editor    = {Achim D. Brucker and
               Fabiano Dalpiaz and
               Paolo Giorgini and
               Per H{\aa}kon Meland and
               Erkuden Rios},
  title     = {Secure and Trustworthy Service Composition - The Aniketos Approach},
  series    = {Lecture Notes in Computer Science},
  volume    = {8900},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13518-2},
  doi       = {10.1007/978-3-319-13518-2},
  isbn      = {978-3-319-13517-5},
  timestamp = {Fri, 09 Jun 2017 11:04:34 +0200},
  biburl    = {https://dblp.org/rec/bib/series/lncs/8900},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier