Privacy time-related analysis in business protocols

Karima Mokhtari, Salima Benbernou, Mohsen Rouached, Mohand Said Hacid, Frank Leyman

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

To automate the analysis of service descriptions, [?] proposed a simple and expressive business protocol model (the specification of possible message exchange sequences) based on state machines, supporting rich timing constraints. Furthermore, developers of client applications need to be aware not only of functional aspects but also of non-functional aspects including privacy. In fact, the major concerns of a client are the disclosure of its personnel data conveyed during the message exchange. The aim of the paper is to study the ability of business protocol to handle the privacy and its time-related properties.

Original languageEnglish
Title of host publication2009 IEEE International Conference on Web Services, ICWS 2009
Pages141-148
Number of pages8
DOIs
Publication statusPublished - 2009
Event2009 IEEE International Conference on Web Services, ICWS 2009 - Los Angeles, CA, United States
Duration: Jul 6 2009Jul 10 2009

Other

Other2009 IEEE International Conference on Web Services, ICWS 2009
CountryUnited States
CityLos Angeles, CA
Period7/6/097/10/09

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Software

Fingerprint Dive into the research topics of 'Privacy time-related analysis in business protocols'. Together they form a unique fingerprint.

  • Cite this

    Mokhtari, K., Benbernou, S., Rouached, M., Hacid, M. S., & Leyman, F. (2009). Privacy time-related analysis in business protocols. In 2009 IEEE International Conference on Web Services, ICWS 2009 (pp. 141-148). [5175817] https://doi.org/10.1109/ICWS.2009.87