Service matchmaking is an important process in the operation of Service-Oriented Architecture (SOA) based systems. In this process, information from both service providers and requestors are used. How to protect the privacy of participating parties during the matchmaking process imposes a challenge. In this paper, a privacy-preserving service matchmaking approach is presented to support semantic-based service matchmaking and avoid privacy leakages to untrusted parties. The approach uses situation-aware access control (SA-AC) mechanism to en-sure the appropriate disclosure and use of private informa-tion by modeling, specifying and enforcing SA-AC policies. It provides an owner-centric mechanism for both service providers and requestors in S...
Web service selection involves finding services from a possibly huge database of similar services. H...
Service Oriented Computing is emerging as the main approach to build distributed enterprise applicat...
This paper presents preliminary results on anonymization and obfuscation techniques to preserve user...
Service Oriented Architecture (SOA) changes the way of conducting business by opening their services...
Service-Oriented Architecture (SOA) is a computer systems design concept which aims to achieve reusa...
Privacy for Service-Oriented Architecture (SOA) is required to gain the trust of those who would use...
Privacy preservation in Service-Oriented Architecture (SOA) is an open problem. This paper focuses o...
Part 4: PoliciesInternational audienceThis paper argues that privacy policies in SOA needs a lifecyc...
14p.International audienceData as a Service (DaaS) builds on service-oriented technologies to enable...
With the significant development of mobile commerce, privacy becomes a major concern for both custom...
International audiencePrivacy is still among the key challenges that keep hampering DaaS service com...
There is a tendency to use electronic networks for delivering services. These electronic services ca...
Service Oriented Computing is emerging as the main approach to build distributed enterprise applicat...
Service Oriented Computing is emerging as the main approach to build distributed enterprise applicat...
This paper identifies privacy issues that arise from using service-oriented architec-tures, which ea...
Web service selection involves finding services from a possibly huge database of similar services. H...
Service Oriented Computing is emerging as the main approach to build distributed enterprise applicat...
This paper presents preliminary results on anonymization and obfuscation techniques to preserve user...
Service Oriented Architecture (SOA) changes the way of conducting business by opening their services...
Service-Oriented Architecture (SOA) is a computer systems design concept which aims to achieve reusa...
Privacy for Service-Oriented Architecture (SOA) is required to gain the trust of those who would use...
Privacy preservation in Service-Oriented Architecture (SOA) is an open problem. This paper focuses o...
Part 4: PoliciesInternational audienceThis paper argues that privacy policies in SOA needs a lifecyc...
14p.International audienceData as a Service (DaaS) builds on service-oriented technologies to enable...
With the significant development of mobile commerce, privacy becomes a major concern for both custom...
International audiencePrivacy is still among the key challenges that keep hampering DaaS service com...
There is a tendency to use electronic networks for delivering services. These electronic services ca...
Service Oriented Computing is emerging as the main approach to build distributed enterprise applicat...
Service Oriented Computing is emerging as the main approach to build distributed enterprise applicat...
This paper identifies privacy issues that arise from using service-oriented architec-tures, which ea...
Web service selection involves finding services from a possibly huge database of similar services. H...
Service Oriented Computing is emerging as the main approach to build distributed enterprise applicat...
This paper presents preliminary results on anonymization and obfuscation techniques to preserve user...