Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Book Section
%1 series/lncs/MelandAADFGGLR14
%A Meland, Per Håkon
%A Asim, Muhammad
%A Ayed, Dhouha
%A Dalpiaz, Fabiano
%A Felix, Edith
%A Giorgini, Paolo
%A Gonzáles, Susana
%A Lempereur, Brett
%A Ronan, John
%B Secure and Trustworthy Service Composition
%D 2014
%E Brucker, Achim D.
%E Dalpiaz, Fabiano
%E Giorgini, Paolo
%E Meland, Per Håkon
%E Rios, Erkuden
%I Springer
%K
%P 10-35
%T Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Research Directions.
%U http://dblp.uni-trier.de/db/series/lncs/lncs8900.html#MelandAADFGGLR14
%V 8900
%@ 978-3-319-13517-5
@incollection{series/lncs/MelandAADFGGLR14,
added-at = {2023-12-13T00:29:58.000+0100},
author = {Meland, Per Håkon and Asim, Muhammad and Ayed, Dhouha and Dalpiaz, Fabiano and Felix, Edith and Giorgini, Paolo and Gonzáles, Susana and Lempereur, Brett and Ronan, John},
biburl = {https://www.bibsonomy.org/bibtex/2694b0afd77df9a59a5b51882fb3e8659/admin},
booktitle = {Secure and Trustworthy Service Composition},
crossref = {series/lncs/8900},
editor = {Brucker, Achim D. and Dalpiaz, Fabiano and Giorgini, Paolo and Meland, Per Håkon and Rios, Erkuden},
ee = {https://doi.org/10.1007/978-3-319-13518-2_2},
interhash = {64336d9c4be632a50dd9104095336637},
intrahash = {694b0afd77df9a59a5b51882fb3e8659},
isbn = {978-3-319-13517-5},
keywords = {},
pages = {10-35},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2023-12-13T00:29:58.000+0100},
title = {Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Research Directions.},
url = {http://dblp.uni-trier.de/db/series/lncs/lncs8900.html#MelandAADFGGLR14},
volume = 8900,
year = 2014
}