Pattern Based Design and Verification of Secure Service Compositions
- Submitting institution
-
Birmingham City University
- Unit of assessment
- 11 - Computer Science and Informatics
- Output identifier
- 11Z_OP_D0051
- Type
- D - Journal article
- DOI
-
10.1109/TSC.2017.2690430
- Title of journal
- IEEE Transactions on Services Computing
- Article number
- -
- First page
- 1
- Volume
- 2017
- Issue
- -
- ISSN
- 1939-1374
- Open access status
- Not compliant
- Month of publication
- -
- Year of publication
- 2017
- URL
-
https://ieeexplore.ieee.org/document/7891550
- Supplementary information
-
-
- Request cross-referral to
- -
- Output has been delayed by COVID-19
- No
- COVID-19 affected output statement
- -
- Forensic science
- No
- Criminology
- No
- Interdisciplinary
- No
- Number of additional authors
-
-
- Research group(s)
-
-
- Citation count
- 2
- Proposed double-weighted
- No
- Reserve for an output with double weighting
- No
- Additional information
- The presented approach proved superiority over state-of-the-art methods in secure service composition, as the existing approaches appears to be computationally intractable and they assume the existence of accurate behaviour model of service composition, which is unrealistic.
The proposed approach has inspired secure service (application) composition in many other domains. More recently, EU Horizon 2020 project SEMIoTICS, has adopted the findings of this approach to generate IoT orchestrations with proven security properties.
- Author contribution statement
- -
- Non-English
- No
- English abstract
- -