메뉴 건너뛰기




Volumn 6994 LNCS, Issue , 2011, Pages 153-164

A general method for assessment of security in complex services

Author keywords

business processes; design graph; risk; security metrics; semirings; services

Indexed keywords

BUSINESS PROCESS; DESIGN GRAPH; SECURITY METRICS; SEMIRINGS; SERVICES;

EID: 80054076363     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-24755-2_14     Document Type: Conference Paper
Times cited : (9)

References (21)
  • 2
    • 77957994724 scopus 로고    scopus 로고
    • version 2.0 January (May 19, 2011)
    • Business process model and notation (bpmn) version 2.0 (January 2011), http://www.omg.org/spec/BPMN/2.0 (May 19, 2011)
    • (2011) Business Process Model and Notation (bpmn)
  • 3
    • 0036680316 scopus 로고    scopus 로고
    • Abstracting soft constraints: Framework, properties, examples
    • Bistarelli, S., Codognet, P., Rossi, F.: Abstracting soft constraints: Framework, properties, examples. Artificial Intelligence 139, 175-211 (2002)
    • (2002) Artificial Intelligence , vol.139 , pp. 175-211
    • Bistarelli, S.1    Codognet, P.2    Rossi, F.3
  • 4
    • 0031095278 scopus 로고    scopus 로고
    • Semiring-based constraint satisfaction and optimizatio
    • Bistarelli, S., Montanari, U., Rossi, F.: Semiring-based constraint satisfaction and optimizatio. Journal of ACM 44(2), 201-236 (1997)
    • (1997) Journal of ACM , vol.44 , Issue.2 , pp. 201-236
    • Bistarelli, S.1    Montanari, U.2    Rossi, F.3
  • 8
    • 57049173095 scopus 로고    scopus 로고
    • Security provisioning in pervasive environments using multi-objective optimization
    • Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
    • Dewri, R., Ray, I., Ray, I., Whitley, D.: Security provisioning in pervasive environments using multi-objective optimization. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 349-363. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5283 , pp. 349-363
    • Dewri, R.1    Ray, I.2    Ray, I.3    Whitley, D.4
  • 9
    • 34147120474 scopus 로고
    • A note on two problems in connexion with graphs
    • Dijkstra, E.W.: A note on two problems in connexion with graphs. Numerische Mathematik 1(1), 269-271 (1959)
    • (1959) Numerische Mathematik , vol.1 , Issue.1 , pp. 269-271
    • Dijkstra, E.W.1
  • 15
    • 79958775085 scopus 로고    scopus 로고
    • Formal analysis of security metrics and risk
    • Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. Springer, Heidelberg
    • Krautsevich, L., Martinelli, F., Yautsiukhin, A.: Formal analysis of security metrics and risk. In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol. 6633, pp. 304-319. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6633 , pp. 304-319
    • Krautsevich, L.1    Martinelli, F.2    Yautsiukhin, A.3
  • 20
    • 0141425904 scopus 로고    scopus 로고
    • Semiring frameworks and algorithms for shortest-distance problems
    • Mohri, M.: Semiring frameworks and algorithms for shortest-distance problems. Journal of Automata, Languages and Combinatorics 7(3), 321-350 (2002)
    • (2002) Journal of Automata, Languages and Combinatorics , vol.7 , Issue.3 , pp. 321-350
    • Mohri, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.