Comprehensive and systematic review of the service composition mechanisms in the cloud environments

A Vakili, NJ Navimipour - Journal of Network and Computer Applications, 2017 - Elsevier
Typically, cloud computing includes the provisioning of dynamically scalable and virtualized
resources as services over the Internet. In the cloud environment, based on the user's …

[HTML][HTML] Security and privacy concerns in cloud-based scientific and business workflows: A systematic review

N Soveizi, F Turkmen, D Karastoyanova - Future Generation Computer …, 2023 - Elsevier
Today, the number of data-intensive and compute-intensive applications like business and
scientific workflows has dramatically increased, which made cloud computing more popular …

QoS-aware cloud service composition: A systematic mapping study from the perspective of computational intelligence

Q She, X Wei, G Nie, D Chen - Expert Systems with Applications, 2019 - Elsevier
Cloud service composition builds new value-added services by combining existing single
services. However, because of the exuberant growth of cloud services and the varying …

IoT capabilities composition and decomposition: A systematic review

K Halba, E Griffor, A Lbath, A Dahbura - IEEE Access, 2023 - ieeexplore.ieee.org
As billions of IoT devices join the Internet, researchers and innovators increasingly explore
IoT capabilities achieved via service composition or reuse of existing capabilities via service …

Providing virtual cloud for special purposes on demand in jointcloud computing environment

DG Cao, B An, PC Shi, HM Wang - Journal of Computer Science and …, 2017 - Springer
Cloud computing has been widely adopted by enterprises because of its on-demand and
elastic resource usage paradigm. Currently most cloud applications are running on one …

A policy enforcement framework for secure data dissemination in vehicular ad hoc network

Y Xia, X Liu, J Ou, W Chen - IEEE Transactions on Vehicular …, 2021 - ieeexplore.ieee.org
In vehicular ad hoc networks (VANETs), enforcing expressive and suitable access policy is
of great importance to achieve desirable and accurate data dissemination services …

Extracting LPL privacy policy purposes from annotated web service source code

K Hjerppe, J Ruohonen, V Leppänen - Software and Systems Modeling, 2023 - Springer
Privacy policies are a mechanism used to inform users of the World Wide Web about the
processing of their personal data. Such processing has special requirements, since …

Toward a Framework for the Composition and Assessment of IoT and CPS Capabilities: Smart Cities Applications

K Halba - 2023 - theses.hal.science
By 2030, over half a trillion devices will be connected to the internet. With so many devices
providing a wide range of services, a framework for prototyping, verifying, and assessing …

Purpose-based access policy on provenance and data algebra

F Zhang, X Fan, W Zhou, P Zhou - arXiv preprint arXiv:1912.00445, 2019 - arxiv.org
It is a crucial mechanism of access control to determine that data can only be accessed for
allowed purposes. To achieve this mechanism, we propose purpose-based access policies …

Identifying inter-organisational resource-service sequences based on similarity for collaborative tasks

H Li, M Liang - International Journal of Information …, 2019 - inderscienceonline.com
To improve the efficiency of a collaborative task, collaboration of resource services in a
business process is important. From the business process viewpoint, the resource services …