Interdependent Security and Compliance in Service Selection

@inproceedings{Karatas2016InterdependentSA,
  title={Interdependent Security and Compliance in Service Selection},
  author={Fatih Karatas},
  year={2016}
}
Application development today is characterized by ever shorter release cycles and more frequent change requests. Hence development methods such as service composition are increasingly arousing interest as viable alternative approaches. While employing web services as building blocks rapidly reduces development times, it raises new challenges regarding security and compliance since their implementation remains a black box which usually cannot be controlled. Security in particular gets even more… CONTINUE READING

References

Publications referenced by this paper.
SHOWING 1-10 OF 319 REFERENCES

Multi-Objective Optimization using Evolutionary Algorithms

K. DEB
  • New York, NY: Wiley & Sons
  • 2001
VIEW 11 EXCERPTS
HIGHLY INFLUENTIAL

Berlin

M. REICHERT, B. WEBER. Enabling Flexibility in Process-Aware Infor Systems
  • Heidelberg: Springer,
  • 2012
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Special Publication 800-145

P. MELL, T. GRANCE. The NIST Definition of Cloud Computing
  • Accessed 27 December 2015. Sept.
  • 2011
VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL

eds

J. BRANKE, K. DEB, K. MIETTINEN, R. SŁOWIŃSKI
  • Multiobjective Optimization – Interactive and Evolutionary Approaches. Vol. 5252. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer,
  • 2008
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

2nd

C. A. COELLO COELLO, G. B. LAMONT, D. A. VAN VELDHUIZEN. Evolutionary Algorithms for Sol Goldberg, J. R. Koza
  • Genetic and Evolutionary Computation Series. Springer,
  • 2007
VIEW 15 EXCERPTS
HIGHLY INFLUENTIAL

Service-Oriented Architecture: Concepts

VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL

Similar Papers

Loading similar papers…