Brett Lempereur, Dhouha Ayed, Muhammad Asim, Madjid Merabti, Qi Shi. Monitoring Threats to Composite Services within the Aniketos Run-Time Framework. In Achim D. Brucker, Fabiano Dalpiaz, Paolo Giorgini, Per Håkon Meland, Erkuden Rios, editors, Secure and Trustworthy Service Composition - The Aniketos Approach. Volume 8900 of Lecture Notes in Computer Science, pages 173-191, Springer, 2014. [doi]
@incollection{LempereurAAMS14, title = {Monitoring Threats to Composite Services within the Aniketos Run-Time Framework}, author = {Brett Lempereur and Dhouha Ayed and Muhammad Asim and Madjid Merabti and Qi Shi}, year = {2014}, doi = {10.1007/978-3-319-13518-2_12}, url = {http://dx.doi.org/10.1007/978-3-319-13518-2_12}, researchr = {https://researchr.org/publication/LempereurAAMS14}, cites = {0}, citedby = {0}, pages = {173-191}, booktitle = {Secure and Trustworthy Service Composition - The Aniketos Approach}, editor = {Achim D. Brucker and Fabiano Dalpiaz and Paolo Giorgini and Per Håkon Meland and Erkuden Rios}, volume = {8900}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-319-13517-5}, }