메뉴 건너뛰기




Volumn 7, Issue 2, 2014, Pages 210-222

Privacy-enhanced web service composition

Author keywords

DaaS services; negotiation; privacy; Service composition

Indexed keywords

DATA PRIVACY; QUALITY OF SERVICE; WEB SERVICES;

EID: 84903198084     PISSN: 19391374     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSC.2013.18     Document Type: Article
Times cited : (37)

References (35)
  • 1
    • 77954600929 scopus 로고    scopus 로고
    • Selecting skyline services for qos-based web service composition
    • M. Alrifai, D. Skoutas, and T. Risse, "Selecting Skyline Services for QoS-Based Web Service Composition," in Proc. 19th Int'l Conf. WWW, 2010, pp. 11-20.
    • (2010) Proc. 19th Int'l Conf. WWW , pp. 11-20
    • Alrifai, M.1    Skoutas, D.2    Risse, T.3
  • 2
    • 77956392439 scopus 로고    scopus 로고
    • A query rewriting approach for web service composition
    • July-Sept.
    • M. Barhamgi, D. Benslimane, and B. Medjahed, "A Query Rewriting Approach for Web Service Composition," IEEE Trans. Serv. Comput., vol. 3, no. 3, pp. 206-222, July-Sept. 2010.
    • (2010) IEEE Trans. Serv. Comput. , vol.3 , Issue.3 , pp. 206-222
    • Barhamgi, M.1    Benslimane, D.2    Medjahed, B.3
  • 5
    • 84884623812 scopus 로고    scopus 로고
    • Privacy enforcement in data analysis workflows
    • CEUR Workshop Proceedings, T.Finin, L. Kagal, and D. Olmedilla, Eds., Busan, South Korea, Nov., CEUR-WS.org
    • Y. Gil, W. Cheung, V. Ratnakar, and K.K. Chan, "Privacy Enforcement in Data Analysis Workflows," in Proc. Workshop PEAS ISWC/ASWC, vol. 320, CEUR Workshop Proceedings, T.Finin, L. Kagal, and D. Olmedilla, Eds., Busan, South Korea, Nov. 2007, CEUR-WS.org.
    • (2007) Proc. Workshop PEAS ISWC/ASWC , vol.320
    • Gil, Y.1    Cheung, W.2    Ratnakar, V.3    Chan, K.K.4
  • 6
    • 77955877886 scopus 로고    scopus 로고
    • Reasoning about the appropriate use of private data through computationalworkflows
    • Mar., Papers from the AAAI Spring Symposium
    • Y. Gil and C. Fritz, "Reasoning About the Appropriate Use of Private Data Through ComputationalWorkflows," in Proc. Intell. Inf. Privacy Manage., Mar. 2010, pp. 69-74, Papers from the AAAI Spring Symposium.
    • (2010) Proc. Intell. Inf. Privacy Manage. , pp. 69-74
    • Gil, Y.1    Fritz, C.2
  • 9
    • 38049134850 scopus 로고    scopus 로고
    • Multi-party, privacy- preserving distributed data mining using a game theoretic framework
    • H. Kargupta, K. Das, and K. Liu, "Multi-party, Privacy- Preserving Distributed Data Mining Using a Game Theoretic Framework," in Proc. 11th Eur. Conf. Principles PKDD, 2007, pp. 523-531.
    • (2007) Proc. 11th Eur. Conf. Principles PKDD , pp. 523-531
    • Kargupta, H.1    Das, K.2    Liu, K.3
  • 10
    • 77950894900 scopus 로고    scopus 로고
    • Security of social information from query analysis in daas
    • J. Kawamoto and M. Yoshikawa, "Security of Social Information from Query Analysis in DaaS," in Proc. EDBT/ICDT Workshops, 2009, pp. 148-152.
    • (2009) Proc. EDBT/ICDT Workshops , pp. 148-152
    • Kawamoto, J.1    Yoshikawa, M.2
  • 11
    • 78049470113 scopus 로고    scopus 로고
    • A pervasive p3p-based negotiation mechanism for privacy-aware pervasive e-commerce
    • Dec.
    • O. Kwon, "A pervasive P3P-Based Negotiation Mechanism for Privacy-Aware Pervasive E-Commerce," Decis. Support Syst., vol. 50, no. 1, pp. 213-221, Dec. 2010.
    • (2010) Decis. Support Syst. , vol.50 , Issue.1 , pp. 213-221
    • Kwon, O.1
  • 12
    • 70350650951 scopus 로고    scopus 로고
    • Lattice based privacy negotiation rule generation for context-aware service
    • Y. Lee, D. Sarangi, O. Kwon, and M.-Y. Kim, "Lattice Based Privacy Negotiation Rule Generation for Context-Aware Service," in Proc. 6th Int'l Conf. UIC, 2009, pp. 340-352.
    • (2009) Proc. 6th Int'l Conf. UIC , pp. 340-352
    • Lee, Y.1    Sarangi, D.2    Kwon, O.3    Kim, M.-Y.4
  • 13
    • 79951826623 scopus 로고    scopus 로고
    • Integration and verification of privacy policies using DSML's structural semantics in a SOA-based workflow environment
    • Aug.
    • Y. Lee, J. Werner, and J. Sztipanovits, "Integration and Verification of Privacy Policies Using DSML's Structural Semantics in a SOA-Based Workflow Environment," J. Korean Soc. Internet Inf., vol. 10, no. 149, pp. 139-149, Aug. 2009.
    • (2009) J. Korean Soc. Internet Inf. , vol.10 , Issue.149 , pp. 139-149
    • Lee, Y.1    Werner, J.2    Sztipanovits, J.3
  • 14
    • 84870437892 scopus 로고    scopus 로고
    • The privacy advocate: Assertion of privacy by personalised contracts
    • Lecture Notes in Business Information Processing J. Filipe and J.A.M. Cordeiro, Eds
    • M. Maaser, S. Ortmann, and P. Langendörfer, "The Privacy Advocate: Assertion of Privacy by Personalised Contracts," in Proc. WEBIST, vol. 8, Lecture Notes in Business Information Processing, J. Filipe and J.A.M. Cordeiro, Eds., 2007, pp. 85-97.
    • (2007) Proc. WEBIST , vol.8 , pp. 85-97
    • Maaser, M.1    Ortmann, S.2    Langendörfer, P.3
  • 15
    • 77952262067 scopus 로고    scopus 로고
    • Data publishing against realistic adversaries
    • Aug.
    • A. Machanavajjhala, J. Gehrke, and M. Götz, "Data Publishing Against Realistic Adversaries," Proc. VLDB Endowment, vol. 2, no. 1, pp. 790-801, Aug. 2009.
    • (2009) Proc. VLDB Endowment , vol.2 , Issue.1 , pp. 790-801
    • Machanavajjhala, A.1    Gehrke, J.2    Götz, M.3
  • 18
    • 0038208063 scopus 로고    scopus 로고
    • Business-to-business interactions: Issues and enabling technologies
    • DOI 10.1007/s00778-003-0087-z
    • B. Medjahed, B. Benatallah, A. Bouguettaya, A.H.H. Ngu, and A.K. Elmagarmid, "Business-to-Business Interactions: Issues and Enabling Technologies," VLDB J., vol. 12, no. 1, pp. 59-85, May 2003. (Pubitemid 36752334)
    • (2003) VLDB Journal , vol.12 , Issue.1 , pp. 59-85
    • Medjahed, B.1    Benatallah, B.2    Bouguettaya, A.3    Ngu, A.H.H.4    Elmagarmid, A.K.5
  • 19
    • 35048824772 scopus 로고    scopus 로고
    • Privacy-awaremobile agent: Protecting privacy in open systems by modelling social behaviour of software agents
    • Lecture Notes in Computer Science, A. Omicini, P. Petta, and J. Pitt, Eds
    • A.P.Meyer, "Privacy-AwareMobile Agent: Protecting Privacy in Open Systems by Modelling Social Behaviour of Software Agents," in Proc. ESAW, vol. 3071, Lecture Notes in Computer Science, A. Omicini, P. Petta, and J. Pitt, Eds., 2003, pp. 123-135.
    • (2003) Proc. ESAW , vol.3071 , pp. 123-135
    • Meyer, A.P.1
  • 21
    • 78049347196 scopus 로고    scopus 로고
    • Value added privacy services for healthcare data
    • L. Motiwalla and X.B. Li, "Value Added Privacy Services for Healthcare Data," in Proc. IEEE Congr. Serv., 2010, pp. 64-71.
    • (2010) Proc. IEEE Congr. Serv. , pp. 64-71
    • Motiwalla, L.1    Li, X.B.2
  • 22
    • 79951818798 scopus 로고    scopus 로고
    • Privacy model and annotation for daas
    • G.A.P. Antonio Brogi and C. Pautasso, Eds., Dec.
    • M. Mrissa, S.-E. Tbahriti, and H.-L. Truong, "Privacy Model and Annotation for DaaS," in Proc. ECOWS, G.A.P. Antonio Brogi and C. Pautasso, Eds., Dec. 2010, pp. 3-10.
    • (2010) Proc. ECOWS , pp. 3-10
    • Mrissa, M.1    Tbahriti, S.-E.2    Truong, H.-L.3
  • 23
    • 80052892858 scopus 로고    scopus 로고
    • Reputation management for composite services in service-oriented systems
    • S. Nepal, Z. Malik, and A. Bouguettaya, "Reputation Management for Composite Services in Service-Oriented Systems," Int'l J. Web Service Res., vol. 8, no. 2, pp. 29-52, 2011.
    • (2011) Int'l J. Web Service Res. , vol.8 , Issue.2 , pp. 29-52
    • Nepal, S.1    Malik, Z.2    Bouguettaya, A.3
  • 25
    • 84903169419 scopus 로고    scopus 로고
    • Oasis. Extensible Access Control Markup Language (XACML) (v1.1)
    • Oasis. Extensible Access Control Markup Language (XACML). Identity, (v1.1):134, 2006.
    • (2006) Identity , pp. 134
  • 27
    • 2642512091 scopus 로고    scopus 로고
    • A model forweb services discovery with QoS
    • S. Ran, "A model forWeb services discovery with QoS," SIGecom Exchanges, vol. 4, no. 1, pp. 1-10, 2003.
    • (2003) SIGecom Exchanges , vol.4 , Issue.1 , pp. 1-10
    • Ran, S.1
  • 28
    • 80155212967 scopus 로고    scopus 로고
    • MeerkatVA dynamic privacy framework forweb services
    • O. Boissier, B. Benatallah, M.P. Papazoglou, Z.W. Ras, and M.-S. Hacid, Eds
    • S.-E. Tbahriti, B. Medjahed, Z.Malik, C. Ghedira, and M.Mrissa, "MeerkatVA Dynamic Privacy Framework forWeb Services," in Proc. Web Intell., O. Boissier, B. Benatallah, M.P. Papazoglou, Z.W. Ras, and M.-S. Hacid, Eds., 2011, pp. 418-421.
    • (2011) Proc. Web Intell. , pp. 418-421
    • Tbahriti, S.-E.1    Medjahed, B.2    Malik, Z.3    Ghedira, C.4    Mrissa, M.5
  • 29
    • 84860728618 scopus 로고    scopus 로고
    • How to preserve privacy in services interaction
    • L. Barolli, T. Enokido, F. Xhafa, and M. Takizawa, Eds
    • S.-E. Tbahriti, B. Medjahed, Z.Malik, C. Ghedira, and M.Mrissa, "How to Preserve Privacy in Services Interaction," in Proc. AINA Workshops, L. Barolli, T. Enokido, F. Xhafa, and M. Takizawa, Eds., 2012, pp. 66-71.
    • (2012) Proc. AINA Workshops , pp. 66-71
    • Tbahriti, S.-E.1    Medjahed, B.2    Malik, Z.3    Ghedira, C.4    Mrissa, M.5
  • 30
    • 80052804889 scopus 로고    scopus 로고
    • Privacy-aware daas services composition
    • Lecture Notes in Computer Science, A. Hameurlain, S.W. Liddle, K.-D. Schewe, and X. Zhou, Eds
    • S.-E. Tbahriti, M. Mrissa, B.Medjahed, C. Ghedira, M. Barhamgi, and J. Fayn, "Privacy-Aware DaaS Services Composition," in Proc. DEXA I, vol. 6860, Lecture Notes in Computer Science, A. Hameurlain, S.W. Liddle, K.-D. Schewe, and X. Zhou, Eds., 2011, pp. 202-216.
    • (2011) Proc. DEXA i , vol.6860 , pp. 202-216
    • Tbahriti, S.-E.1    Mrissa, M.2    Medjahed, B.3    Ghedira, C.4    Barhamgi, M.5    Fayn, J.6
  • 32
    • 84870376786 scopus 로고    scopus 로고
    • A semantic-based user privacy protection framework for web services
    • Lecture Notes in Computer Science, B. Mobasher and S.S. Anand, Eds
    • A. Tumer, A. Dogac, and I.H. Toroslu, "A Semantic-Based User Privacy Protection Framework for Web Services," in Proc. ITWP, vol. 3169, Lecture Notes in Computer Science, B. Mobasher and S.S. Anand, Eds., 2003, pp. 289-305.
    • (2003) Proc. ITWP , vol.3169 , pp. 289-305
    • Tumer, A.1    Dogac, A.2    Toroslu, I.H.3
  • 34
    • 84903151708 scopus 로고    scopus 로고
    • W3C, The Platform for Privacy Preference Specification
    • W3C, The Platform for Privacy Preference Specification, 2004.
    • (2004)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.