Exploiting Workflow Languages and Semantics for Validation of Security Policies in IoT Composite Services.
Flora AmatoValentina CasolaGiovanni CozzolinoAlessandra De BenedictisFrancesco MoscatoPublished in: IEEE Internet Things J. (2020)
Keyphrases
- security policies
- composite services
- service composition
- access control
- web service composition
- web services
- security management
- petri net
- service oriented
- network security
- access control systems
- distributed systems
- security requirements
- service description
- service selection
- management system
- access control policies
- metadata
- real time
- quality of service
- business process
- fine grained
- service oriented architecture
- service discovery
- cloud computing
- conceptual graphs
- service delivery