Monitoring Threats to Composite Services within the Aniketos Run-Time Framework

Brett Lempereur, Dhouha Ayed, Muhammad Asim, Madjid Merabti, Qi Shi. Monitoring Threats to Composite Services within the Aniketos Run-Time Framework. In Achim D. Brucker, Fabiano Dalpiaz, Paolo Giorgini, Per Håkon Meland, Erkuden Rios, editors, Secure and Trustworthy Service Composition - The Aniketos Approach. Volume 8900 of Lecture Notes in Computer Science, pages 173-191, Springer, 2014. [doi]

@incollection{LempereurAAMS14,
  title = {Monitoring Threats to Composite Services within the Aniketos Run-Time Framework},
  author = {Brett Lempereur and Dhouha Ayed and Muhammad Asim and Madjid Merabti and Qi Shi},
  year = {2014},
  doi = {10.1007/978-3-319-13518-2_12},
  url = {http://dx.doi.org/10.1007/978-3-319-13518-2_12},
  researchr = {https://researchr.org/publication/LempereurAAMS14},
  cites = {0},
  citedby = {0},
  pages = {173-191},
  booktitle = {Secure and Trustworthy Service Composition - The Aniketos Approach},
  editor = {Achim D. Brucker and Fabiano Dalpiaz and Paolo Giorgini and Per Håkon Meland and Erkuden Rios},
  volume = {8900},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-319-13517-5},
}