References

  1. Martín Abadi & Cédric Fournet (2003): Access Control Based on Execution History. In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2003, San Diego, California, USA. The Internet Society.
  2. Massimo Bartoletti (2009): Usage Automata. In: Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, LNCS 5511. Springer, pp. 52–69, doi:10.1007/978-3-642-03459-6_4.
  3. Massimo Bartoletti, Gabriele Costa & Roberto Zunino (2009): Jalapa: Securing Java with Local Policies. Electronic Notes in Theoretical Computer Science 253(5), pp. 145–151, doi:10.1016/j.entcs.2009.11.020.
  4. Massimo Bartoletti, Pierpaolo Degano & Gian Luigi Ferrari (2009): Planning and verifying service composition. Journal of Computer Security (JCS) 17(5), pp. 799–837, doi:10.3233/JCS-2009-0357.
  5. Massimo Bartoletti, Pierpaolo Degano, Gian Luigi Ferrari & Roberto Zunino (2007): Types and Effects for Resource Usage Analysis. In: Proc. of FOSSACS-07, pp. 32–47, doi:10.1007/978-3-540-71389-0_4.
  6. Stefano Bistarelli, Ugo Montanari & Francesca Rossi (1997): Semiring-based constraint satisfaction and optimization. Journal of the ACM 44, pp. 201–236, doi:10.1145/256303.256306.
  7. Mario Bravetti, Ivan Lanese & Gianluigi Zavattaro (2008): Contract-Driven Implementation of Choreographies. In: Proc. of TGC-08, pp. 1–18, doi:10.1007/978-3-642-00945-7_1.
  8. Mario Bravetti & Gianluigi Zavattaro (2007): Towards a unifying theory for choreography conformance and contract compliance. In: In Pre-proc. CS-07. Springer, pp. 34–50, doi:10.1007/978-3-540-77351-1_4.
  9. Giuseppe Castagna, Nils Gesbert & Luca Padovani (2008): A theory of contracts for web services. SIGPLAN Notices 43, pp. 261–272, doi:10.1145/1328438.1328471.
  10. Feng Cheng, David Gamarnik, Nitin Jengte, Wanli Min & Bala Ramachandran (2005): Modelling Operational Risks in Business Process. Technical Report RC23872. IBM.
  11. E. M. Clarke, E. A. Emerson & A. P. Sistla (1986): Automatic verification of finite-state concurrent systems using temporal logic specifications. TOPLAS 8, pp. 244–263, doi:10.1145/5397.5399.
  12. Gabriele Costa, Pierpaolo Degano & Fabio Martinelli (2010): Modular Plans for Secure Service Composition. In: Proc. of ARSPA-WITS-10, LCNS 6186, doi:10.1007/978-3-642-16074-5_4.
  13. Gabriele Costa, Pierpaolo Degano & Fabio Martinelli (2011): Secure service orchestration in open networks. Journal of Systems Architecture - Embedded Systems Design 57(3), pp. 231–239, doi:10.1016/j.sysarc.2010.09.001.
  14. Frank Innerhofer-Oberperfler, Fabio Massacci & Artsiom Yautsiukhin (2008): Pareto-Optimal Architecture according to Assurance Indicators. In: Proceedings of the 13th Nordic Workshop on Secure IT Systems.
  15. Cynthia Irvine & Timothy Levin (2000): Quality of security service. In: Proceedings of the 2000 Workshop on New security paradigms. ACM, New York, NY, USA, pp. 91–99, doi:10.1145/366173.366195.
  16. Günter Karjoth, Birgit Pfitzmann, Matthias Schunter & Michael Waidner (2005): Service-oriented Assurance - Comprehensive Security by Explicit Assurances. In: Proc. of QoP-05, doi:10.1007/978-0-387-36584-8_2.
  17. Fabio Martinelli & Ilaria Matteucci (2007): Synthesis of Web Services Orchestrators in a Timed Setting. In: Proc. of WS-FM-07, pp. 124–138, doi:10.1007/978-3-540-79230-7_9.
  18. Fabio Massacci & Artsiom Yautsiukhin (2007): An Algorithm for the Appraisal of Assurance Indicators for Complex Business Processe. In: Proc. of QoP-07. ACM, doi:10.1145/1314257.1314265.
  19. G. Rojec-Goldmann M.C. Jaeger & G. Mühl. (2005): QoS Aggregation in Web Service Compositions. In: Proc. of EEE-05, doi:10.1109/EEE.2005.110.
  20. Hanne Riis Nielson & Fleming Nielson (2007): A flow-sensitive analysis of privacy properties. In: Proceedings of the 20-th IEEE Computer Security Foundations Symposium, pp. 249 –264, doi:10.1109/CSF.2007.4.
  21. Luca Padovani (2008): Contract-Directed Synthesis of Simple Orchestrators. In: Proceedings of the 19th international conference on Concurrency Theory. Springer-Verlag, pp. 131–146, doi:10.1007/978-3-540-85361-9_13.
  22. S. Rossi & D. Macedonio (2009): Information flow security for service compositions. In: Proc. of ICUMT-09, pp. 1 –8, doi:10.1109/ICUMT.2009.5345455.
  23. Tao Yu & Kwei-Jay Lin (2005): A Broker-Based Framework for QoS-Aware Web Service Composition. In: Proc. of EEE-05), doi:10.1109/EEE.2005.1.
  24. Tao Yu, Yue Zhang & Kwei-Jay Lin (2007): Efficient algorithms for Web services selection with end-to-end QoS constraints. ACM Transactions on the Web 1, doi:10.1145/1232722.1232728.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org