Technologies such as Internet of Things allow small devices to offer web-based services in an open and dynamic networking environments on a massive scale. End users or service consumers face a hard decision over which service to choose among the available ones, as security holds a key in the decision making process. In this paper a base linguistic evaluation set is designed, based on which all the other fuzzy term sets that used for describing security attributes are uniformed and integrated for calculating an overall security value of the services. This work, to the best of our knowledge, is the first practical solution to offer direct comparisons and rankings of network services based on multiple security attributes such as confidentialit...
As most Web services are delivered by third parties over unreliable Internet and are late bound at r...
Dependability is an important characteristic that a trustworthy computer system should have. It is a...
The development of the IT industry and computing resources allows the formation of cyberphysical soc...
Technologies such as Internet of Things allow small devices to offer web-based services in an open a...
The number of web services available on the Internet has grown rapidly. Service consumers face a har...
With the increase in the number of cloud service offerings by the cloud service providers nowadays,...
AbstractCloud computing has become a part of the competitive market today. Various cloud computing s...
As the Internet of things continues to mature, there has been a wide and rapid adoption of Internet ...
Although the use of Cloud services is proliferating, the notion of Cloud security remains ambiguous....
Web services development is a key theme in utilisation of the commercial exploitation of the semanti...
AbstractNowadays more effort has been spending on combining subsystems to form larger systems such a...
The users of Cloud Service Providers (CSP) often motivate their choice of providers based on criteri...
Addressing security in early stages of web service development has always been a major engineering t...
Because the Internet of Things (IoT) pervasively extends to all facets of life, the "things" are inc...
Given that the information and the physical worlds are merging, threats to integrity, confidentiali...
As most Web services are delivered by third parties over unreliable Internet and are late bound at r...
Dependability is an important characteristic that a trustworthy computer system should have. It is a...
The development of the IT industry and computing resources allows the formation of cyberphysical soc...
Technologies such as Internet of Things allow small devices to offer web-based services in an open a...
The number of web services available on the Internet has grown rapidly. Service consumers face a har...
With the increase in the number of cloud service offerings by the cloud service providers nowadays,...
AbstractCloud computing has become a part of the competitive market today. Various cloud computing s...
As the Internet of things continues to mature, there has been a wide and rapid adoption of Internet ...
Although the use of Cloud services is proliferating, the notion of Cloud security remains ambiguous....
Web services development is a key theme in utilisation of the commercial exploitation of the semanti...
AbstractNowadays more effort has been spending on combining subsystems to form larger systems such a...
The users of Cloud Service Providers (CSP) often motivate their choice of providers based on criteri...
Addressing security in early stages of web service development has always been a major engineering t...
Because the Internet of Things (IoT) pervasively extends to all facets of life, the "things" are inc...
Given that the information and the physical worlds are merging, threats to integrity, confidentiali...
As most Web services are delivered by third parties over unreliable Internet and are late bound at r...
Dependability is an important characteristic that a trustworthy computer system should have. It is a...
The development of the IT industry and computing resources allows the formation of cyberphysical soc...