Author of the publication

The SCIFC Model for Information Flow Control in Web Service Composition.

, , , and . ICWS, page 1-8. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

WS-Sim: A Web Service Simulation Toolset with Realistic Data Support., , and . COMPSAC Workshops, page 109-114. IEEE Computer Society, (2010)Delegation-Based Security Model for Web Services., , and . HASE, page 82-91. IEEE Computer Society, (2007)A Mutual Trust Method for Energy Internet Agent Nodes in Untrusted Environment., , , , , , , and . ICAIS (2), volume 12240 of Lecture Notes in Computer Science, page 557-569. Springer, (2020)Blockchain Trust Model for Malicious Node Detection in Wireless Sensor Networks., , , , , and . IEEE Access, (2019)A donation tracing blockchain model using improved DPoS consensus algorithm., , , , , and . Peer-to-Peer Netw. Appl., 14 (5): 2789-2800 (2021)Role-based integrated access control and data provenance for SOA based net-centric systems., , , , and . SOSE, page 225-234. IEEE Computer Society, (2011)Effective and efficient implementation of an information flow control protocol for service composition., , , and . SOCA, page 1-8. IEEE Computer Society, (2009)The SCIFC Model for Information Flow Control in Web Service Composition., , , and . ICWS, page 1-8. IEEE Computer Society, (2009)Rule-Based Run-Time Information Flow Control in Service Cloud., , , and . ICWS, page 524-531. IEEE Computer Society, (2011)An Efficient ID-Based Directed Signature Scheme from Optimal Eta Pairing., , , and . ISICA, volume 316 of Communications in Computer and Information Science, page 440-448. Springer, (2012)