Tag Archives: Secure and Trustworthy Service Composition: The Aniketos Approach (Lecture Notes in Computer Science / Security and Cryptology) (by Achim Bru

Secure and Trustworthy Service Composition: The Aniketos Approach (Lecture Notes in Computer Science / Security and Cryptology) (by Achim Brucker, Fabiano Dalpiaz, Paolo Giorgini, Per Hakon Meland, Erkuden Rios)


Author(s): Achim Brucker, Fabiano Dalpiaz, Paolo Giorgini, Per Hakon Meland, Erkuden Rios

Publisher: Springer
Publish date: 2014-11-20
ISBN-10: 3319135171
ISBN-13: 9783319135175
Language: English
Description:
The Future Internet envisions a move toward widespread use of
services as a way of networked interaction. However, while the
technologies for developing and deploying services are well
established, methods for ensuring trust and security are fewer
and less mature. Lack of trust and confidence in composed
services and in their constituent parts is reckoned to be one of
the significant factors limiting widespread uptake of
service-oriented computing.

This state-of-the-art survey illustrates the results of the
Aniketos – Secure and Trustworthy Composite Services – project
(funded under the EU 7th Research Framework… more…

Read Source: Secure and Trustworthy Service Composition: The Aniketos Approach (Lecture Notes in Computer Science / Security and Cryptology) (by Achim Brucker, Fabiano Dalpiaz, Paolo Giorgini, Per Hakon Meland, Erkuden Rios)»

Secure and Trustworthy Service Composition: The Aniketos Approach (Lecture Notes in Computer Science / Security and Cryptology) (by Achim Brucker, Fabiano Dalpiaz, Paolo Giorgini, Per Hakon Meland, Erkuden Rios)


Author(s): Achim Brucker, Fabiano Dalpiaz, Paolo Giorgini, Per Hakon Meland, Erkuden Rios

Publisher: Springer
Publish date: 2014-11-20
ISBN-10: 3319135171
ISBN-13: 9783319135175
Language: English
Description:
The Future Internet envisions a move toward widespread use of
services as a way of networked interaction. However, while the
technologies for developing and deploying services are well
established, methods for ensuring trust and security are fewer
and less mature. Lack of trust and confidence in composed
services and in their constituent parts is reckoned to be one of
the significant factors limiting widespread uptake of
service-oriented computing.

This state-of-the-art survey illustrates the results of the
Aniketos – Secure and Trustworthy Composite Services – project
(funded under the EU 7th Research Framework… more…

Read Source: Secure and Trustworthy Service Composition: The Aniketos Approach (Lecture Notes in Computer Science / Security and Cryptology) (by Achim Brucker, Fabiano Dalpiaz, Paolo Giorgini, Per Hakon Meland, Erkuden Rios)»