This paper focuses on the service composition based on security properties of services from an end user perspective. End users are usually not expert in computer security, but expert users of computer software. They typically either own or work for small and medium enterprises (SMEs). The proposed framework attempts to demonstrate that end users of small enterprises can compose a service based application based on the security profiles of software services. The paper argues that the security concerns of various stakeholders of services should be specified differently. The paper envisions a framework with which end users could select services consistent with their preferred security features suitable for their businesses. With the same token...
Based on several research projects and close co-operation with leading security providers and their ...
Based on several research projects and close co-operation with leading security providers and their ...
Due to rapid transitioning towards digitalized society and extended reliance on interconnected digit...
This paper introduces a framework for security-oriented software service composition and evolution. ...
Modern applications can be easily developed and operated by discovering and consuming cloud services...
In the world of large-scale applications, software-as-a-service (SaaS) in general and use of micro-s...
This article introduces a framework for security-oriented software service composition and evolution...
In the e-age, internet and e-affairs are the composite blend of business process and technology; the...
The research proposed a novel approach to improve the alignment of high-level business requirements ...
International audienceIn this paper, we present a process-oriented tool allowing the specification o...
This paper argues that in order to address the challenges of security compatibility checking between...
The software engineering community is striving to handle a significant number of new critical demand...
During the electronic business, the clients and the merchants make use of the internet. Thus, we can...
In the world of large-scale applications, software-as-a-service (SaaS) in general and use of micro-s...
ABSTRACT Rapid evolution of information technology has contributed to the evolution of more sophist...
Based on several research projects and close co-operation with leading security providers and their ...
Based on several research projects and close co-operation with leading security providers and their ...
Due to rapid transitioning towards digitalized society and extended reliance on interconnected digit...
This paper introduces a framework for security-oriented software service composition and evolution. ...
Modern applications can be easily developed and operated by discovering and consuming cloud services...
In the world of large-scale applications, software-as-a-service (SaaS) in general and use of micro-s...
This article introduces a framework for security-oriented software service composition and evolution...
In the e-age, internet and e-affairs are the composite blend of business process and technology; the...
The research proposed a novel approach to improve the alignment of high-level business requirements ...
International audienceIn this paper, we present a process-oriented tool allowing the specification o...
This paper argues that in order to address the challenges of security compatibility checking between...
The software engineering community is striving to handle a significant number of new critical demand...
During the electronic business, the clients and the merchants make use of the internet. Thus, we can...
In the world of large-scale applications, software-as-a-service (SaaS) in general and use of micro-s...
ABSTRACT Rapid evolution of information technology has contributed to the evolution of more sophist...
Based on several research projects and close co-operation with leading security providers and their ...
Based on several research projects and close co-operation with leading security providers and their ...
Due to rapid transitioning towards digitalized society and extended reliance on interconnected digit...