Fujii, K., and Suda, T., 2004. Dynamic service
composition using semantic information. In Proc. of
the 2nd international conference on Service oriented
computing (ICSOC), pp. 39-48. ACM.
Gürgens, S., Ochsenschläger, P. and Rudolph, C., 2002.
Authenticity and provability - a formal framework. In
Infrastr. Sec. Conf. (InfraSec). LNCS, vol. 2437, SV,
pp. 227–245.
Gürgens, S., Ochsenschläger, P. and Rudolph, C., 2005a.
Abstractions preserving parameter confidentiality. In
Europ. Symp. On Research in Computer Security
(ESORICS). 418–437.
Gürgens, S., Ochsenschläger, P. and Rudolph, C., 2005b.
On a formal framework for security properties.
International Comp. Standards & Interface Journal
(CSI), Special issue on formal methods, techniques
and tools for secure and reliable app. 27(5) 457–466.
IBM BPM industry packs. [Online]. Available: http://
www-03.ibm.com/software/products/us/en/ business-
process-manager-industry-packs/
Jaeger, M. C., Rojec-Goldmann, G., and Muhl, G., 2004.
QoS aggregation for web service composition using
workflow patterns. In Proc. of the 8th IEEE
International Enterprise distributed object computing
conference, (EDOC 2004), pp. 149-159.
Khan, K. M., Erradi, A., Alhazbi, S. and Han, J., 2012.
Security oriented service composition: A framework.
In Proc. of International Conference on Innovations in
Information Technology (IIT), pp. 48-53.
Lelarge, M., Liu, Z. and Riabov, A.V., 2006. Automatic
composition of secure workflows. In Proc. of the
Third international conference on Autonomic and
Trusted Computing, (ATC). Berlin, SV, pp. 322-331.
Majithia, S., Walker, D. W., and Gray, W. A., 2004. A
framework for automated service composition in
service-oriented architectures. In Proc. of the 1st
European Semantic Web Symposium, Lecture Notes in
Computer Science, vol. 3053, pp. 269-283.
Mantel, H., 2002. On the Composition of Secure Systems.
In Proc. of the 2002 IEEE Symposium on Security and
Privacy (SP2002). IEEE Computer Society,
Washington, DC, USA, 88-.
Medjahed, B., Bouguettaya, A. and Elmagarmid, A.K.,
2003. Composing web services on the semantic web.
The VLDB Journal, vol. 12, no. 4, pp. 333-351.
Pino, L. and Spanoudakis, G., 2012a. Constructing secure
service compositions with patterns. In Services
(SERVICES), 2012 IEEE Eighth World Congress on.
IEEE, pp. 184-191.
Pino, L. and Spanoudakis, G., 2012b. Finding secure
compositions of software services: Towards a pattern
based approach. In 5th IFIP International Conference
on New Technologies, Mobility and Security (NTMS).
IEEE, pp. 1-5.
Pino, L., Spanoudakis, G., Gürgens, S., Fuchs, A. and
Mahbub, K., 2012. D02.2 ASSERT aware service
orchestration patterns. ASSERT4SOA Project, Tech.
Rep. [Online]. Available: http://assert4soa.eu/public-
deliverables/
Ponnekanti, S. R., and Fox, A., 2002. Sword: A developer
toolkit for web service composition. In Proc. of the
11th World Wide Web Conference (Web Engineering
Track)
, pp. 7-11.
Raman, B., Agarwal, S., Chen, Y., Caesar, M., Cui, W.,
Johansson, P., ... and Stoica, I., 2002. The SAHARA
model for service composition across multiple
providers. In Proceedings of the First International
Conference on Pervasive Computing, Lecture Notes in
Computer Science, vol. 2414, pp. 1-14.
RosettaNet. [Online]. Available: http://
www.rosettanet.org/
Shirey, R., 2007. Internet Security Glossary, Version 2.
RFC 4949 (Informational), IETF. [Online]. Available:
http://www.ietf.org/rfc/rfc4949.txt.
Spanoudakis, G., Mahbub, K., Pino, L., Foster, H., Maña,
A. and Pujol, G., 2011. D02.1 ASSERTs aware
service query language and discovery engine.
ASSERT4SOA Project, Tech. Rep. [Online].
Available: http://assert4soa.eu/public-deliverables/
Tan, W., Fan, Y., and Zhou, M., 2009. A Petri Net-Based
Method for Compatibility Analysis and Composition
of Web Services in Business Process Execution
Language. In IEEE Transactions on Automation
Science and Engineering, vol.6, no.1, pp.94-106.
Van Der Aalst, W. M. P., Ter Hofstede, A. H. M.,
Kiepuszewski, B. and Barros, A.P., 2003. Workflow
patterns. Distrib. Parallel Databases, vol. 14, no. 1,
pp. 5-51.
Zisman, A., Spanoudakis, G., Dooley, J. and Siveroni, I.,
2013. Proactive and reactive runtime service
discovery: A framework and its evaluation. IEEE
Transactions on Software Engineering, http://
doi.ieeecomputersociety.org/10.1109/TSE.2012.84,
Dec 2012.
DiscoveringSecureServiceCompositions
253