default search action
Search dblp for Publications
export results for "toc:db/series/lncs/lncs8900.bht:"
@incollection{DBLP:series/lncs/AsimYBLS14, author = {Muhammad Asim and Artsiom Yautsiukhin and Achim D. Brucker and Brett Lempereur and Qi Shi}, editor = {Achim D. Brucker and Fabiano Dalpiaz and Paolo Giorgini and Per H{\aa}kon Meland and Erkuden Rios}, title = {Security Policy Monitoring of Composite Services}, booktitle = {Secure and Trustworthy Service Composition - The Aniketos Approach}, series = {Lecture Notes in Computer Science}, volume = {8900}, pages = {192--202}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13518-2\_13}, doi = {10.1007/978-3-319-13518-2\_13}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/AsimYBLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/BeckTMT14, author = {Elke Beck and Sandra Tr{\"{o}}sterer and Alexander G. Mirnig and Manfred Tscheligi}, editor = {Achim D. Brucker and Fabiano Dalpiaz and Paolo Giorgini and Per H{\aa}kon Meland and Erkuden Rios}, title = {Characteristics and Addressed Challenges in Evaluating the Aniketos Project Outcome}, booktitle = {Secure and Trustworthy Service Composition - The Aniketos Approach}, series = {Lecture Notes in Computer Science}, volume = {8900}, pages = {234--246}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13518-2\_16}, doi = {10.1007/978-3-319-13518-2\_16}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/BeckTMT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/Brucker14, author = {Achim D. Brucker}, editor = {Achim D. Brucker and Fabiano Dalpiaz and Paolo Giorgini and Per H{\aa}kon Meland and Erkuden Rios}, title = {Using SecureBPMN for Modelling Security-Aware Service Compositions}, booktitle = {Secure and Trustworthy Service Composition - The Aniketos Approach}, series = {Lecture Notes in Computer Science}, volume = {8900}, pages = {110--120}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13518-2\_8}, doi = {10.1007/978-3-319-13518-2\_8}, timestamp = {Fri, 09 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/Brucker14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/BruckerCG14, author = {Achim D. Brucker and Luca Compagna and Pierre Guilleminot}, editor = {Achim D. Brucker and Fabiano Dalpiaz and Paolo Giorgini and Per H{\aa}kon Meland and Erkuden Rios}, title = {Compliance Validation of Secure Service Compositions}, booktitle = {Secure and Trustworthy Service Composition - The Aniketos Approach}, series = {Lecture Notes in Computer Science}, volume = {8900}, pages = {136--149}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13518-2\_10}, doi = {10.1007/978-3-319-13518-2\_10}, timestamp = {Fri, 09 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/BruckerCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/BruckerMMSZ14, author = {Achim D. Brucker and Francesco Malmignati and Madjid Merabti and Qi Shi and Bo Zhou}, editor = {Achim D. Brucker and Fabiano Dalpiaz and Paolo Giorgini and Per H{\aa}kon Meland and Erkuden Rios}, title = {The Aniketos Service Composition Framework - Analysing and Ranking of Secure Services}, booktitle = {Secure and Trustworthy Service Composition - The Aniketos Approach}, series = {Lecture Notes in Computer Science}, volume = {8900}, pages = {121--135}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13518-2\_9}, doi = {10.1007/978-3-319-13518-2\_9}, timestamp = {Mon, 09 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/lncs/BruckerMMSZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/ElshaafiMB14, author = {Hisain Elshaafi and Jimmy McGibney and Dmitri Botvich}, editor = {Achim D. Brucker and Fabiano Dalpiaz and Paolo Giorgini and Per H{\aa}kon Meland and Erkuden Rios}, title = {Aggregation and Optimisation of Trustworthiness of Composite Services}, booktitle = {Secure and Trustworthy Service Composition - The Aniketos Approach}, series = {Lecture Notes in Computer Science}, volume = {8900}, pages = {150--172}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13518-2\_11}, doi = {10.1007/978-3-319-13518-2\_11}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/ElshaafiMB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/Giannakakis14, author = {Konstantinos Giannakakis}, editor = {Achim D. Brucker and Fabiano Dalpiaz and Paolo Giorgini and Per H{\aa}kon Meland and Erkuden Rios}, title = {Adopting Existing Communication Platforms for Security Enabling Technologies}, booktitle = {Secure and Trustworthy Service Composition - The Aniketos Approach}, series = {Lecture Notes in Computer Science}, volume = {8900}, pages = {36--49}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13518-2\_3}, doi = {10.1007/978-3-319-13518-2\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/Giannakakis14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/LempereurAAMS14, author = {Brett Lempereur and Dhouha Ayed and Muhammad Asim and Madjid Merabti and Qi Shi}, editor = {Achim D. Brucker and Fabiano Dalpiaz and Paolo Giorgini and Per H{\aa}kon Meland and Erkuden Rios}, title = {Monitoring Threats to Composite Services within the Aniketos Run-Time Framework}, booktitle = {Secure and Trustworthy Service Composition - The Aniketos Approach}, series = {Lecture Notes in Computer Science}, volume = {8900}, pages = {173--191}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13518-2\_12}, doi = {10.1007/978-3-319-13518-2\_12}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/LempereurAAMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/Meland14, author = {Per H{\aa}kon Meland}, editor = {Achim D. Brucker and Fabiano Dalpiaz and Paolo Giorgini and Per H{\aa}kon Meland and Erkuden Rios}, title = {Composite Services with Dynamic Behaviour}, booktitle = {Secure and Trustworthy Service Composition - The Aniketos Approach}, series = {Lecture Notes in Computer Science}, volume = {8900}, pages = {1--9}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13518-2\_1}, doi = {10.1007/978-3-319-13518-2\_1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/Meland14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/MelandAADFGGLR14, author = {Per H{\aa}kon Meland and Muhammad Asim and Dhouha Ayed and Fabiano Dalpiaz and Edith Felix and Paolo Giorgini and Susana Gonz{\'{a}}les and Brett Lempereur and John Ronan}, editor = {Achim D. Brucker and Fabiano Dalpiaz and Paolo Giorgini and Per H{\aa}kon Meland and Erkuden Rios}, title = {Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Research Directions}, booktitle = {Secure and Trustworthy Service Composition - The Aniketos Approach}, series = {Lecture Notes in Computer Science}, volume = {8900}, pages = {10--35}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13518-2\_2}, doi = {10.1007/978-3-319-13518-2\_2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/MelandAADFGGLR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/MelandRTB14, author = {Per H{\aa}kon Meland and Erkuden Rios and Vasilis Tountopoulos and Achim D. Brucker}, editor = {Achim D. Brucker and Fabiano Dalpiaz and Paolo Giorgini and Per H{\aa}kon Meland and Erkuden Rios}, title = {The Aniketos Platform}, booktitle = {Secure and Trustworthy Service Composition - The Aniketos Approach}, series = {Lecture Notes in Computer Science}, volume = {8900}, pages = {50--62}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13518-2\_4}, doi = {10.1007/978-3-319-13518-2\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/MelandRTB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/PajaDG14a, author = {Elda Paja and Fabiano Dalpiaz and Paolo Giorgini}, editor = {Achim D. Brucker and Fabiano Dalpiaz and Paolo Giorgini and Per H{\aa}kon Meland and Erkuden Rios}, title = {The Socio-technical Security Requirements Modelling Language for Secure Composite Services}, booktitle = {Secure and Trustworthy Service Composition - The Aniketos Approach}, series = {Lecture Notes in Computer Science}, volume = {8900}, pages = {63--78}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13518-2\_5}, doi = {10.1007/978-3-319-13518-2\_5}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/PajaDG14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/PajaPDRG14, author = {Elda Paja and Mauro Poggianella and Fabiano Dalpiaz and Pierluigi Roberti and Paolo Giorgini}, editor = {Achim D. Brucker and Fabiano Dalpiaz and Paolo Giorgini and Per H{\aa}kon Meland and Erkuden Rios}, title = {Security Requirements Engineering with STS-Tool}, booktitle = {Secure and Trustworthy Service Composition - The Aniketos Approach}, series = {Lecture Notes in Computer Science}, volume = {8900}, pages = {95--109}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13518-2\_7}, doi = {10.1007/978-3-319-13518-2\_7}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/PajaPDRG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/PaulTGH14, author = {St{\'{e}}phane Paul and Alessandra Tedeschi and Erlend Andreas Gj{\ae}re and Ivonne A. Herrera}, editor = {Achim D. Brucker and Fabiano Dalpiaz and Paolo Giorgini and Per H{\aa}kon Meland and Erkuden Rios}, title = {The Aniketos Design-Time Framework Applied - {A} Case in Air Traffic Management}, booktitle = {Secure and Trustworthy Service Composition - The Aniketos Approach}, series = {Lecture Notes in Computer Science}, volume = {8900}, pages = {203--218}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13518-2\_14}, doi = {10.1007/978-3-319-13518-2\_14}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/PaulTGH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/RiosMIDS14, author = {Erkuden Rios and Francesco Malmignati and Eider Iturbe and Michela D'Errico and Mattia Salnitri}, editor = {Achim D. Brucker and Fabiano Dalpiaz and Paolo Giorgini and Per H{\aa}kon Meland and Erkuden Rios}, title = {From Consumer Requirements to Policies in Secure Services}, booktitle = {Secure and Trustworthy Service Composition - The Aniketos Approach}, series = {Lecture Notes in Computer Science}, volume = {8900}, pages = {79--94}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13518-2\_6}, doi = {10.1007/978-3-319-13518-2\_6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/RiosMIDS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/TountopoulosGGKK14, author = {Vasilis Tountopoulos and Ira Giannakoudaki and Konstantinos Giannakakis and Lefteris Korres and Leonidas Kallipolitis}, editor = {Achim D. Brucker and Fabiano Dalpiaz and Paolo Giorgini and Per H{\aa}kon Meland and Erkuden Rios}, title = {Supporting Security and Trust in Complex e-Government Services}, booktitle = {Secure and Trustworthy Service Composition - The Aniketos Approach}, series = {Lecture Notes in Computer Science}, volume = {8900}, pages = {219--233}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13518-2\_15}, doi = {10.1007/978-3-319-13518-2\_15}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/TountopoulosGGKK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/lncs/8900, editor = {Achim D. Brucker and Fabiano Dalpiaz and Paolo Giorgini and Per H{\aa}kon Meland and Erkuden Rios}, title = {Secure and Trustworthy Service Composition - The Aniketos Approach}, series = {Lecture Notes in Computer Science}, volume = {8900}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13518-2}, doi = {10.1007/978-3-319-13518-2}, isbn = {978-3-319-13517-5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/8900.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.