[1] |
ENDREI M , ANG J , ARSANJANI A ,et al. Patterns:Service Oriented Architecture and Web Services[S].IBM International Technical Support Organization,2004. IBM International Technical Support Organization, 2004.
|
[2] |
JOANNA N . The Personal Web:smart internet for me[A]. Proceedings of the 2010 Conference of the Center for Advanced Studies on Collaborative Research[C]. 2010.
|
[3] |
YU T , ZHANG Y , LIN K J . Efficient algorithms for Web services selection with end-to-end QoS constraints[J]. ACM Transactions on the Web (TWEB), 2007,1(1): 103-126.
|
[4] |
龙军, 袁鑫攀, 桂卫华 . 基于环境感知的可信QoS评价与服务选取策略[J]. 电子学报, 2012,40(6): 1133-1140. LONG J , YUAN X P , GUO W H . A policy for the trusted QoS evaluation and service selection with environment aware[J]. Acta Electronica Sinica, 2012,40(6): 1133-1140.
|
[5] |
BERTINO E , SQUICCIARINI A C , MEVI D . A fine-grained access control model for Web services[A]. SCC[C]. 2004. 33-40.
|
[6] |
BHATTI R , BERTINO E , GHAFOOR A . Trust-based context-awareaccess control model for Web-services[A]. ICWS[C]. 2004. 184-191.
|
[7] |
ZHENG Z B , ZHU J M , LYU M R . Service-generated big data and big data-as-a-service:an overview[A]. 2013 IEEE International Congress on Big Data[C]. 2013. 403-410.
|
[8] |
VOLPANO D , IRVINE C , SMITH G . A sound type system for secure flow analysis[J]. Journal of Computer Security, 1996,4(2): 167-187.
|
[9] |
FERRANTE J , OTTENSTEIN K J , WARREN J D . The program dependence graph and its use in optimization[J]. ACM Transactions on Programming Languages and Systems, 1987,9(3): 319-349.
|
[10] |
DIMITROVA R , FINKBEINER B,KOVáCS M , et al.Model Checking Information Flow in Reactive Systems . Verification,Model Checking,and Abstract Interpretation[M]. Springer Berlin Heidelberg, 2012. 169-185.
|
[11] |
HUTTER D , VOLKAMER M . Information flow control to secure dynamic Web service composition[A]. Security in Pervasive Computing[C]. 2006. 196-210.
|
[12] |
XI N , MA J F , SUN C , et al. Distributed information flow verification framework for the composition of service chain in wireless sensor network[EB/OL]. .
|
[13] |
NAKAJIMA S . Model-checking of safety and security aspects in Web service flows[A]. ICWE 2004[C]. 2004. 488-501.
|
[14] |
SABINA R L S . Model checking adaptive multilevel service compositions[A]. FACS 2010[C]. 2012. 106-124.
|
[15] |
SUN C , ZHAI E , CHEN Z ,et al. A multi-compositional enforcement on information flow security[J]. Information and Communications Security Lecture Notes in Computer Science, 2011,7043: 345-359.
|
[16] |
GROBA C , CLARKE S . Opportunistic composition of sequentially-connected services in mobile computing environments[A]. ICWS[C]. 2011. 17-24.
|
[17] |
BIBA K J . Integrity Considerations for Secure Computer Systems[R]. Electronic Systems Division,Bedford,MA, 1977.
|
[18] |
BARTHE G,D’ARGENIO P R , RESK T . Secure information flow by self-composition[A]. Proc of the 17th Computer Security Foundations Workshop[C]. 2004. 100-114.
|
[19] |
Open Source Project.Spin verification tool[EB/OL]. .
|
[20] |
Open Source Project.NS-3 project[EB/OL]. .
|