Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Book Section
%1 series/lncs/AsimYBLS14
%A Asim, Muhammad
%A Yautsiukhin, Artsiom
%A Brucker, Achim D.
%A Lempereur, Brett
%A Shi, Qi
%B Secure and Trustworthy Service Composition
%D 2014
%E Brucker, Achim D.
%E Dalpiaz, Fabiano
%E Giorgini, Paolo
%E Meland, Per Håkon
%E Rios, Erkuden
%I Springer
%K
%P 192-202
%T Security Policy Monitoring of Composite Services.
%U http://dblp.uni-trier.de/db/series/lncs/lncs8900.html#AsimYBLS14
%V 8900
%@ 978-3-319-13517-5
@incollection{series/lncs/AsimYBLS14,
added-at = {2023-12-12T20:53:48.000+0100},
author = {Asim, Muhammad and Yautsiukhin, Artsiom and Brucker, Achim D. and Lempereur, Brett and Shi, Qi},
biburl = {https://www.bibsonomy.org/bibtex/254406592a6fb44560f27b04ae0bf4414/admin},
booktitle = {Secure and Trustworthy Service Composition},
crossref = {series/lncs/8900},
editor = {Brucker, Achim D. and Dalpiaz, Fabiano and Giorgini, Paolo and Meland, Per Håkon and Rios, Erkuden},
ee = {https://doi.org/10.1007/978-3-319-13518-2_13},
interhash = {3600b44ada2ed7ee24e241881e8ed3eb},
intrahash = {54406592a6fb44560f27b04ae0bf4414},
isbn = {978-3-319-13517-5},
keywords = {},
pages = {192-202},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2023-12-12T20:53:48.000+0100},
title = {Security Policy Monitoring of Composite Services.},
url = {http://dblp.uni-trier.de/db/series/lncs/lncs8900.html#AsimYBLS14},
volume = 8900,
year = 2014
}