Search dblp for Publications

export results for "toc:db/series/lncs/lncs8900.bht:"

 download as .bib file

@incollection{DBLP:series/lncs/AsimYBLS14,
  author       = {Muhammad Asim and
                  Artsiom Yautsiukhin and
                  Achim D. Brucker and
                  Brett Lempereur and
                  Qi Shi},
  editor       = {Achim D. Brucker and
                  Fabiano Dalpiaz and
                  Paolo Giorgini and
                  Per H{\aa}kon Meland and
                  Erkuden Rios},
  title        = {Security Policy Monitoring of Composite Services},
  booktitle    = {Secure and Trustworthy Service Composition - The Aniketos Approach},
  series       = {Lecture Notes in Computer Science},
  volume       = {8900},
  pages        = {192--202},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13518-2\_13},
  doi          = {10.1007/978-3-319-13518-2\_13},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/AsimYBLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/BeckTMT14,
  author       = {Elke Beck and
                  Sandra Tr{\"{o}}sterer and
                  Alexander G. Mirnig and
                  Manfred Tscheligi},
  editor       = {Achim D. Brucker and
                  Fabiano Dalpiaz and
                  Paolo Giorgini and
                  Per H{\aa}kon Meland and
                  Erkuden Rios},
  title        = {Characteristics and Addressed Challenges in Evaluating the Aniketos
                  Project Outcome},
  booktitle    = {Secure and Trustworthy Service Composition - The Aniketos Approach},
  series       = {Lecture Notes in Computer Science},
  volume       = {8900},
  pages        = {234--246},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13518-2\_16},
  doi          = {10.1007/978-3-319-13518-2\_16},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/BeckTMT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/Brucker14,
  author       = {Achim D. Brucker},
  editor       = {Achim D. Brucker and
                  Fabiano Dalpiaz and
                  Paolo Giorgini and
                  Per H{\aa}kon Meland and
                  Erkuden Rios},
  title        = {Using SecureBPMN for Modelling Security-Aware Service Compositions},
  booktitle    = {Secure and Trustworthy Service Composition - The Aniketos Approach},
  series       = {Lecture Notes in Computer Science},
  volume       = {8900},
  pages        = {110--120},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13518-2\_8},
  doi          = {10.1007/978-3-319-13518-2\_8},
  timestamp    = {Fri, 09 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/Brucker14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/BruckerCG14,
  author       = {Achim D. Brucker and
                  Luca Compagna and
                  Pierre Guilleminot},
  editor       = {Achim D. Brucker and
                  Fabiano Dalpiaz and
                  Paolo Giorgini and
                  Per H{\aa}kon Meland and
                  Erkuden Rios},
  title        = {Compliance Validation of Secure Service Compositions},
  booktitle    = {Secure and Trustworthy Service Composition - The Aniketos Approach},
  series       = {Lecture Notes in Computer Science},
  volume       = {8900},
  pages        = {136--149},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13518-2\_10},
  doi          = {10.1007/978-3-319-13518-2\_10},
  timestamp    = {Fri, 09 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/BruckerCG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/BruckerMMSZ14,
  author       = {Achim D. Brucker and
                  Francesco Malmignati and
                  Madjid Merabti and
                  Qi Shi and
                  Bo Zhou},
  editor       = {Achim D. Brucker and
                  Fabiano Dalpiaz and
                  Paolo Giorgini and
                  Per H{\aa}kon Meland and
                  Erkuden Rios},
  title        = {The Aniketos Service Composition Framework - Analysing and Ranking
                  of Secure Services},
  booktitle    = {Secure and Trustworthy Service Composition - The Aniketos Approach},
  series       = {Lecture Notes in Computer Science},
  volume       = {8900},
  pages        = {121--135},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13518-2\_9},
  doi          = {10.1007/978-3-319-13518-2\_9},
  timestamp    = {Mon, 09 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/lncs/BruckerMMSZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/ElshaafiMB14,
  author       = {Hisain Elshaafi and
                  Jimmy McGibney and
                  Dmitri Botvich},
  editor       = {Achim D. Brucker and
                  Fabiano Dalpiaz and
                  Paolo Giorgini and
                  Per H{\aa}kon Meland and
                  Erkuden Rios},
  title        = {Aggregation and Optimisation of Trustworthiness of Composite Services},
  booktitle    = {Secure and Trustworthy Service Composition - The Aniketos Approach},
  series       = {Lecture Notes in Computer Science},
  volume       = {8900},
  pages        = {150--172},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13518-2\_11},
  doi          = {10.1007/978-3-319-13518-2\_11},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/ElshaafiMB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/Giannakakis14,
  author       = {Konstantinos Giannakakis},
  editor       = {Achim D. Brucker and
                  Fabiano Dalpiaz and
                  Paolo Giorgini and
                  Per H{\aa}kon Meland and
                  Erkuden Rios},
  title        = {Adopting Existing Communication Platforms for Security Enabling Technologies},
  booktitle    = {Secure and Trustworthy Service Composition - The Aniketos Approach},
  series       = {Lecture Notes in Computer Science},
  volume       = {8900},
  pages        = {36--49},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13518-2\_3},
  doi          = {10.1007/978-3-319-13518-2\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/Giannakakis14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/LempereurAAMS14,
  author       = {Brett Lempereur and
                  Dhouha Ayed and
                  Muhammad Asim and
                  Madjid Merabti and
                  Qi Shi},
  editor       = {Achim D. Brucker and
                  Fabiano Dalpiaz and
                  Paolo Giorgini and
                  Per H{\aa}kon Meland and
                  Erkuden Rios},
  title        = {Monitoring Threats to Composite Services within the Aniketos Run-Time
                  Framework},
  booktitle    = {Secure and Trustworthy Service Composition - The Aniketos Approach},
  series       = {Lecture Notes in Computer Science},
  volume       = {8900},
  pages        = {173--191},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13518-2\_12},
  doi          = {10.1007/978-3-319-13518-2\_12},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/LempereurAAMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/Meland14,
  author       = {Per H{\aa}kon Meland},
  editor       = {Achim D. Brucker and
                  Fabiano Dalpiaz and
                  Paolo Giorgini and
                  Per H{\aa}kon Meland and
                  Erkuden Rios},
  title        = {Composite Services with Dynamic Behaviour},
  booktitle    = {Secure and Trustworthy Service Composition - The Aniketos Approach},
  series       = {Lecture Notes in Computer Science},
  volume       = {8900},
  pages        = {1--9},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13518-2\_1},
  doi          = {10.1007/978-3-319-13518-2\_1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/Meland14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/MelandAADFGGLR14,
  author       = {Per H{\aa}kon Meland and
                  Muhammad Asim and
                  Dhouha Ayed and
                  Fabiano Dalpiaz and
                  Edith Felix and
                  Paolo Giorgini and
                  Susana Gonz{\'{a}}les and
                  Brett Lempereur and
                  John Ronan},
  editor       = {Achim D. Brucker and
                  Fabiano Dalpiaz and
                  Paolo Giorgini and
                  Per H{\aa}kon Meland and
                  Erkuden Rios},
  title        = {Security and Trustworthiness Threats to Composite Services: Taxonomy,
                  Countermeasures, and Research Directions},
  booktitle    = {Secure and Trustworthy Service Composition - The Aniketos Approach},
  series       = {Lecture Notes in Computer Science},
  volume       = {8900},
  pages        = {10--35},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13518-2\_2},
  doi          = {10.1007/978-3-319-13518-2\_2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/MelandAADFGGLR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/MelandRTB14,
  author       = {Per H{\aa}kon Meland and
                  Erkuden Rios and
                  Vasilis Tountopoulos and
                  Achim D. Brucker},
  editor       = {Achim D. Brucker and
                  Fabiano Dalpiaz and
                  Paolo Giorgini and
                  Per H{\aa}kon Meland and
                  Erkuden Rios},
  title        = {The Aniketos Platform},
  booktitle    = {Secure and Trustworthy Service Composition - The Aniketos Approach},
  series       = {Lecture Notes in Computer Science},
  volume       = {8900},
  pages        = {50--62},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13518-2\_4},
  doi          = {10.1007/978-3-319-13518-2\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/MelandRTB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/PajaDG14a,
  author       = {Elda Paja and
                  Fabiano Dalpiaz and
                  Paolo Giorgini},
  editor       = {Achim D. Brucker and
                  Fabiano Dalpiaz and
                  Paolo Giorgini and
                  Per H{\aa}kon Meland and
                  Erkuden Rios},
  title        = {The Socio-technical Security Requirements Modelling Language for Secure
                  Composite Services},
  booktitle    = {Secure and Trustworthy Service Composition - The Aniketos Approach},
  series       = {Lecture Notes in Computer Science},
  volume       = {8900},
  pages        = {63--78},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13518-2\_5},
  doi          = {10.1007/978-3-319-13518-2\_5},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/PajaDG14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/PajaPDRG14,
  author       = {Elda Paja and
                  Mauro Poggianella and
                  Fabiano Dalpiaz and
                  Pierluigi Roberti and
                  Paolo Giorgini},
  editor       = {Achim D. Brucker and
                  Fabiano Dalpiaz and
                  Paolo Giorgini and
                  Per H{\aa}kon Meland and
                  Erkuden Rios},
  title        = {Security Requirements Engineering with STS-Tool},
  booktitle    = {Secure and Trustworthy Service Composition - The Aniketos Approach},
  series       = {Lecture Notes in Computer Science},
  volume       = {8900},
  pages        = {95--109},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13518-2\_7},
  doi          = {10.1007/978-3-319-13518-2\_7},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/PajaPDRG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/PaulTGH14,
  author       = {St{\'{e}}phane Paul and
                  Alessandra Tedeschi and
                  Erlend Andreas Gj{\ae}re and
                  Ivonne A. Herrera},
  editor       = {Achim D. Brucker and
                  Fabiano Dalpiaz and
                  Paolo Giorgini and
                  Per H{\aa}kon Meland and
                  Erkuden Rios},
  title        = {The Aniketos Design-Time Framework Applied - {A} Case in Air Traffic
                  Management},
  booktitle    = {Secure and Trustworthy Service Composition - The Aniketos Approach},
  series       = {Lecture Notes in Computer Science},
  volume       = {8900},
  pages        = {203--218},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13518-2\_14},
  doi          = {10.1007/978-3-319-13518-2\_14},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/PaulTGH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/RiosMIDS14,
  author       = {Erkuden Rios and
                  Francesco Malmignati and
                  Eider Iturbe and
                  Michela D'Errico and
                  Mattia Salnitri},
  editor       = {Achim D. Brucker and
                  Fabiano Dalpiaz and
                  Paolo Giorgini and
                  Per H{\aa}kon Meland and
                  Erkuden Rios},
  title        = {From Consumer Requirements to Policies in Secure Services},
  booktitle    = {Secure and Trustworthy Service Composition - The Aniketos Approach},
  series       = {Lecture Notes in Computer Science},
  volume       = {8900},
  pages        = {79--94},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13518-2\_6},
  doi          = {10.1007/978-3-319-13518-2\_6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/RiosMIDS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/TountopoulosGGKK14,
  author       = {Vasilis Tountopoulos and
                  Ira Giannakoudaki and
                  Konstantinos Giannakakis and
                  Lefteris Korres and
                  Leonidas Kallipolitis},
  editor       = {Achim D. Brucker and
                  Fabiano Dalpiaz and
                  Paolo Giorgini and
                  Per H{\aa}kon Meland and
                  Erkuden Rios},
  title        = {Supporting Security and Trust in Complex e-Government Services},
  booktitle    = {Secure and Trustworthy Service Composition - The Aniketos Approach},
  series       = {Lecture Notes in Computer Science},
  volume       = {8900},
  pages        = {219--233},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13518-2\_15},
  doi          = {10.1007/978-3-319-13518-2\_15},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/TountopoulosGGKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/lncs/8900,
  editor       = {Achim D. Brucker and
                  Fabiano Dalpiaz and
                  Paolo Giorgini and
                  Per H{\aa}kon Meland and
                  Erkuden Rios},
  title        = {Secure and Trustworthy Service Composition - The Aniketos Approach},
  series       = {Lecture Notes in Computer Science},
  volume       = {8900},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13518-2},
  doi          = {10.1007/978-3-319-13518-2},
  isbn         = {978-3-319-13517-5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/8900.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics