作者: Ning Xi , Jianfeng Ma , Cong Sun , Tao Zhang
DOI: 10.1109/ICWS.2013.81
关键词:
摘要: Dynamic service composition in wireless environment provides us with a promising approach to build complex applications based on the basic value-added services. In different network domains, multiple services may provide data security levels. order prevent from information leakage, flow is major concern composite However, energy-limited nature of user terminal mobile computing environments poses significant challenge for centralized verification where node need cost lots computation and resources. this paper, we specify constraints each participant secure chain lattice model, then present decentralized framework that cooperates participants complete process distributively respect their policies. Through experiments evaluations, results show it decreases single node.