Harvest, yield, and scalable tolerant systems

A Fox, EA Brewer - Proceedings of the seventh workshop on …, 1999 - ieeexplore.ieee.org
The cost of reconciling consistency and state management with high availability is highly
magnified by the unprecedented scale and robustness requirements of today's Internet …

[图书][B] Trustworthy cyber-physical systems

G Mohammadi - 2019 - Springer
In the era of cyber-physical systems (CPS), almost all activities of our daily life are supported
by a multitude of heterogeneous, loosely coupled systems communicating over the Internet …

A survey on quantitative evaluation of web service security

B Zhou, Q Shi, P Yang - 2016 IEEE Trustcom/BigDataSE/ISPA, 2016 - ieeexplore.ieee.org
The number of web services available on the Internet has grown rapidly. Service consumers
face a hard decision over which service to choose among the available ones. Security holds …

Maintaining trustworthiness of socio-technical systems at run-time

N Gol Mohammadi, T Bandyszak, M Moffie… - Trust, Privacy, and …, 2014 - Springer
Trustworthiness of dynamical and distributed socio-technical systems is a key factor for the
success and wide adoption of these systems in digital businesses. Different trustworthiness …

A framework for secure service composition

AD Brucker, F Malmignati, M Merabti… - … Conference on Social …, 2013 - ieeexplore.ieee.org
Modern applications are inherently heterogeneous: they are built by composing loosely
coupled services that are, usually, offered and operated by different service providers. While …

iDetective: a location based game to persuade users unconsciously

A Yoshii, Y Funabashi, H Kimura… - 2011 IEEE 17th …, 2011 - ieeexplore.ieee.org
Persuasive applications that change user behaviors and attitudes have been used for
dietary support and healthcare and so on. When we use persuasive application to solve the …

Modelling, validating, and ranking of secure service compositions

AD Brucker, B Zhou, F Malmignati… - Software: Practice …, 2017 - Wiley Online Library
In the world of large‐scale applications, software as a service (SaaS) in general and use of
microservices, in particular, is bringing service‐oriented architectures to a new level …

Event driven monitoring of composite services

M Asim, D Llewellyn-Jones… - … conference on social …, 2013 - ieeexplore.ieee.org
The Future Internet will be populated by not just data and devices, but also services. Service-
Oriented Architecture (SOA) approaches are allowing new ways for users and developers to …

[PDF][PDF] Combining Risk-Management and Computational Approaches for Trustworthiness Evaluation of Socio-Technical Systems.

NG Mohammadi, T Bandyszak, A Goldsteen… - CAiSE …, 2015 - researchgate.net
The analysis of existing software evaluation techniques reveals the need for evidence-
based evaluation of systems' trustworthiness. This paper aims at evaluating trustworthiness …

Signal estimation using wavelet-Markov models

MS Crouse, RG Baraniuk… - 1997 IEEE International …, 1997 - ieeexplore.ieee.org
Current wavelet-based statistical signal and image processing techniques such as
shrinkage and filtering treat the wavelet coefficients as though they were statistically …