Abstract — This paper analyzes three existing tunable security services based on a conceptual model. The aim of the study is to examine the tunable features provided by the different services in a structured and consistent way. This implies that for each service user preferences as well as environment and application characteristics that influence the choice of a certain security configuration are identified and discussed. I
The research proposed a novel approach to improve the alignment of high-level business requirements ...
The need to analyze and compare the security specifications of different applications can arise in d...
Over the last few years a large number of security patterns have been proposed. However, this large ...
Security has traditionally been thought of as a system or network attribute that was the result of t...
Many security services today only provides one security configuration at run-time, and cannot then u...
This paper focuses on the service composition based on security properties of services from an end u...
This paper introduces a framework for security-oriented software service composition and evolution. ...
International audienceThe interaction between different applications and services requires expressin...
This paper proposes a modeling framework on how to specify security preferences and importance of so...
The interaction between different applications and services requires expressing their security prope...
Abstract 1. We examine the concept of security as a dimension of Quality of Service in distributed s...
Abstract. Composite services foster reuse and efficiency in providing consumers with different funct...
International audienceDependability is an important characteristic that a trustworthy computer syste...
This article introduces a framework for security-oriented software service composition and evolution...
This paper discusses the modulation of security services in response to changes in network condition...
The research proposed a novel approach to improve the alignment of high-level business requirements ...
The need to analyze and compare the security specifications of different applications can arise in d...
Over the last few years a large number of security patterns have been proposed. However, this large ...
Security has traditionally been thought of as a system or network attribute that was the result of t...
Many security services today only provides one security configuration at run-time, and cannot then u...
This paper focuses on the service composition based on security properties of services from an end u...
This paper introduces a framework for security-oriented software service composition and evolution. ...
International audienceThe interaction between different applications and services requires expressin...
This paper proposes a modeling framework on how to specify security preferences and importance of so...
The interaction between different applications and services requires expressing their security prope...
Abstract 1. We examine the concept of security as a dimension of Quality of Service in distributed s...
Abstract. Composite services foster reuse and efficiency in providing consumers with different funct...
International audienceDependability is an important characteristic that a trustworthy computer syste...
This article introduces a framework for security-oriented software service composition and evolution...
This paper discusses the modulation of security services in response to changes in network condition...
The research proposed a novel approach to improve the alignment of high-level business requirements ...
The need to analyze and compare the security specifications of different applications can arise in d...
Over the last few years a large number of security patterns have been proposed. However, this large ...