SDTIOA: Modeling the Timed Privacy Requirements of IoT Service Composition: A User Interaction Perspective for Automatic Transformation from BPEL to Timed Automata

With the development of the Internet of Things (IoT) and the Internet, new kinds of services based on IoT devices will benefit everyone. As a key step in achieving a complex business structure based on a massive number of IoT devices, establishing an effective service composition is extremely import...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Mobile networks and applications Ročník 26; číslo 6; s. 2272 - 2297
Hlavní autoři: Gao, Honghao, Zhang, Yida, Miao, Huaikou, Barroso, Ramón J. Durán, Yang, Xiaoxian
Médium: Journal Article
Jazyk:angličtina
Vydáno: New York Springer US 01.12.2021
Springer Nature B.V
Témata:
ISSN:1383-469X, 1572-8153
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract With the development of the Internet of Things (IoT) and the Internet, new kinds of services based on IoT devices will benefit everyone. As a key step in achieving a complex business structure based on a massive number of IoT devices, establishing an effective service composition is extremely important. The emerging architecture of composition is related to process management and is subject to security risks, such as privacy leaks. Traditional service composition methods have difficulty verifying the timed privacy requirements of an IoT service composition. Therefore, this paper proposes an automatic method of transforming Business Process Execution Language (BPEL) into timed automata for formal verification, with the aim of formalizing timed privacy requirements for the IoT service composition and verifying the formal model returned to the UPPAAL supporting tool. First, a privacy requirement template is introduced to analyze the structure of the IoT service composition. Then, a timed computation tree logic (TCTL) property formula template is used to describe the privacy requirements, especially time constraints. Second, an extended timed I/O automata model, namely, the Sensitive Data Timed I/O Automata (SDTIOA) model, is proposed to formalize communication behavior, sensitive data treatment, and service time. Third, the corresponding transformation rules and algorithms are designed for BPEL and SDTIOA. These models can be adjusted through user interaction. Next, as a practical engineering application, we develop a prototype to show how to work with UPPAAL and generate UPPAAL code from SDTIOA code. Finally, a case study is discussed to illustrate the processes of modeling and timed verification for an IoT service composition.
AbstractList With the development of the Internet of Things (IoT) and the Internet, new kinds of services based on IoT devices will benefit everyone. As a key step in achieving a complex business structure based on a massive number of IoT devices, establishing an effective service composition is extremely important. The emerging architecture of composition is related to process management and is subject to security risks, such as privacy leaks. Traditional service composition methods have difficulty verifying the timed privacy requirements of an IoT service composition. Therefore, this paper proposes an automatic method of transforming Business Process Execution Language (BPEL) into timed automata for formal verification, with the aim of formalizing timed privacy requirements for the IoT service composition and verifying the formal model returned to the UPPAAL supporting tool. First, a privacy requirement template is introduced to analyze the structure of the IoT service composition. Then, a timed computation tree logic (TCTL) property formula template is used to describe the privacy requirements, especially time constraints. Second, an extended timed I/O automata model, namely, the Sensitive Data Timed I/O Automata (SDTIOA) model, is proposed to formalize communication behavior, sensitive data treatment, and service time. Third, the corresponding transformation rules and algorithms are designed for BPEL and SDTIOA. These models can be adjusted through user interaction. Next, as a practical engineering application, we develop a prototype to show how to work with UPPAAL and generate UPPAAL code from SDTIOA code. Finally, a case study is discussed to illustrate the processes of modeling and timed verification for an IoT service composition.
Author Miao, Huaikou
Gao, Honghao
Yang, Xiaoxian
Zhang, Yida
Barroso, Ramón J. Durán
Author_xml – sequence: 1
  givenname: Honghao
  orcidid: 0000-0001-6861-9684
  surname: Gao
  fullname: Gao, Honghao
  organization: School of Computer Engineering and Science, Shanghai University
– sequence: 2
  givenname: Yida
  surname: Zhang
  fullname: Zhang, Yida
  organization: School of Computer Engineering and Science, Shanghai University
– sequence: 3
  givenname: Huaikou
  surname: Miao
  fullname: Miao, Huaikou
  organization: School of Computer Engineering and Science, Shanghai University
– sequence: 4
  givenname: Ramón J. Durán
  surname: Barroso
  fullname: Barroso, Ramón J. Durán
  organization: Faculty of Telecommunication Engineering, University of Valladolid
– sequence: 5
  givenname: Xiaoxian
  surname: Yang
  fullname: Yang, Xiaoxian
  email: xxyang@sspu.edu.cn
  organization: School of Computer and Information Engineering, Shanghai Polytechnic University
BookMark eNp9kcFOGzEQhq0KpALtC3Aaqedt7d2118stTaFECiKCrcTNcryz1ChrB9uJ4Hn6onVIpEo9cLHHo-_z2PpPyZHzDgk5Z_Qro7T5FhmjlShoyQrKZC2Klw_khPGmLCTj1VGuK1kVtWgfPpLTGJ8opZzL-oT8uf_RzW4nF3Dje1xZ9wjpN0JnR-xhEexWm1e4w-eNDTiiSxH8ADPfwT2GrTUIUz-ufbTJencBE_gVMcDMJQza7HqwwBDXmOstwuADTDbJjzpZA13QLubW7pTBIfgRvi8u55D8Yf6B1Z_I8aBXET8f9jPSXV120-tifvtzNp3MC1OxNhUcl7VkfbOUVd32Qg5CGzRLTtlSNlobztsWxUClMYiYl6rsWyp4OYiGY1udkS_7a9fBP28wJvXkN8HliaoUpawpr6nIlNxTJvgYAw7K2PT2hRS0XSlG1S4RtU9E5UTUWyLqJavlf-o62FGH1_elai_FDLtHDP9e9Y71F9jgo6s
CitedBy_id crossref_primary_10_1049_cmu2_12371
crossref_primary_10_1155_2022_3086516
crossref_primary_10_1186_s13638_022_02137_z
crossref_primary_10_1186_s13638_022_02139_x
crossref_primary_10_1002_spe_3372
crossref_primary_10_1093_comjnl_bxac119
crossref_primary_10_3390_cryptography7020030
crossref_primary_10_1155_2022_2440313
crossref_primary_10_1007_s11036_022_02039_w
crossref_primary_10_1155_2022_4193365
crossref_primary_10_1007_s11036_022_01972_0
crossref_primary_10_1093_comjnl_bxac131
crossref_primary_10_1007_s11276_021_02870_1
crossref_primary_10_1007_s11227_023_05388_9
crossref_primary_10_1186_s13638_022_02132_4
crossref_primary_10_1186_s13638_022_02135_1
crossref_primary_10_1002_ett_4515
crossref_primary_10_1016_j_knosys_2023_110463
crossref_primary_10_1049_cmu2_12507
crossref_primary_10_3390_math11163477
crossref_primary_10_1002_dac_5229
crossref_primary_10_1155_2022_2578744
crossref_primary_10_1111_exsy_12975
crossref_primary_10_1007_s11276_021_02878_7
crossref_primary_10_1111_exsy_12977
crossref_primary_10_1080_03081079_2024_2345876
crossref_primary_10_1109_TCE_2025_3526427
crossref_primary_10_1155_2022_7359134
crossref_primary_10_1093_comjnl_bxac124
crossref_primary_10_1007_s11036_022_01977_9
crossref_primary_10_1007_s00500_023_09530_w
crossref_primary_10_1007_s12083_022_01343_2
crossref_primary_10_1007_s11036_022_02010_9
crossref_primary_10_1007_s11036_022_02012_7
crossref_primary_10_1007_s11276_022_03203_6
crossref_primary_10_1109_TITS_2022_3157447
crossref_primary_10_1155_2022_4943218
crossref_primary_10_1093_comjnl_bxac060
crossref_primary_10_1007_s11036_022_01974_y
crossref_primary_10_1007_s11036_022_01976_w
crossref_primary_10_3390_electronics11142117
crossref_primary_10_1049_cmu2_12379
crossref_primary_10_1186_s13638_022_02100_y
crossref_primary_10_1186_s13638_022_02148_w
Cites_doi 10.1109/LICS.1990.113766
10.1109/CCWC.2017.7868419
10.1007/s12652-020-01831-4
10.1007/978-3-642-11710-7_2
10.1109/MC.2011.291
10.4018/IJITSA.2017070102
10.1109/QSIC.2009.20
10.1109/ISDPE.2010.25
10.1007/978-3-642-21759-3_19
10.1109/BigData.2016.7841030
10.1016/S1571-0661(04)00329-9
10.1109/IRI.2014.7051928
10.1504/IJBPIM.2017.082765
10.1142/S0218194017500334
10.1016/j.bushor.2015.03.008
10.1142/S0218194018500390
10.1145/1501434.1501466
10.1145/3331076.3331105
10.1145/1755952.1755967
10.12785/amis/071L20
10.1016/j.jcss.2014.02.005
10.1007/978-3-540-68644-6_13
10.1145/352600.352606
10.1145/2554850.2555014
ContentType Journal Article
Copyright The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021
The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.
Copyright_xml – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021
– notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.
DBID AAYXX
CITATION
3V.
7SC
7SP
7WY
7WZ
7XB
87Z
8AL
8AO
8FD
8FE
8FG
8FK
8FL
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
CCPQU
DWQXO
FRNLG
F~G
GNUQQ
HCIFZ
JQ2
K60
K6~
K7-
L.-
L7M
L~C
L~D
M0C
M0N
P5Z
P62
PHGZM
PHGZT
PKEHL
PQBIZ
PQBZA
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q9U
DOI 10.1007/s11036-021-01846-x
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Collection
Computing Database (Alumni Edition)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni Edition)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Aerospace Database‎ (1962 - current)
ProQuest Central Essentials
ProQuest Central
Business Premium Collection (Proquest)
Technology Collection
ProQuest One Community College
ProQuest Central Korea
Business Premium Collection (Alumni)
ABI/INFORM Global (Corporate)
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
Computer Science Database
ABI/INFORM Professional Advanced
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global
Computing Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Databases
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest One Business (UW System Shared)
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
DatabaseTitle CrossRef
ABI/INFORM Global (Corporate)
ProQuest Business Collection (Alumni Edition)
ProQuest One Business
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Pharma Collection
ProQuest Central China
ABI/INFORM Complete
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
ABI/INFORM Complete (Alumni Edition)
Advanced Technologies & Aerospace Collection
Business Premium Collection
ABI/INFORM Global
ProQuest Computing
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
Electronics & Communications Abstracts
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Business Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Business (Alumni)
ProQuest One Academic
ProQuest Central (Alumni)
ProQuest One Academic (New)
Business Premium Collection (Alumni)
DatabaseTitleList ABI/INFORM Global (Corporate)

Database_xml – sequence: 1
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1572-8153
EndPage 2297
ExternalDocumentID 10_1007_s11036_021_01846_x
GrantInformation_xml – fundername: National Natural Science Foundation of China
  grantid: 61902236
  funderid: https://doi.org/10.13039/501100001809
GroupedDBID -59
-5G
-BR
-EM
-Y2
-~C
-~X
.4S
.86
.DC
.VR
06D
0R~
0VY
123
1N0
1SB
2.D
203
28-
29M
29~
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
3V.
4.4
406
408
409
40D
40E
5QI
5VS
67Z
6NX
7WY
85S
8AO
8FE
8FG
8FL
8FW
8TC
8UJ
8US
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYOK
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFO
ACGFS
ACHSB
ACHXU
ACKNC
ACM
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACREN
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADL
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADYOE
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFEXP
AFFNX
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFYQB
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMTXH
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARCEE
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
AZQEC
B-.
BA0
BBWZM
BDATZ
BENPR
BEZIV
BGLVJ
BGNMA
BPHCQ
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DWQXO
EBLON
EBS
EDO
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRNLG
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ6
GQ7
GQ8
GROUPED_ABI_INFORM_COMPLETE
GROUPED_ABI_INFORM_RESEARCH
GXS
H13
HCIFZ
HF~
HG5
HG6
HGAVV
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I-F
I07
I09
IHE
IJ-
IKXTQ
ITG
ITH
ITM
IWAJR
IXC
IXE
IZIGR
IZQ
I~X
I~Y
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K60
K6V
K6~
K7-
KDC
KOV
KOW
LAK
LLZTM
M0C
M0N
M4Y
MA-
N2Q
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P2P
P62
P9O
PF0
PQBIZ
PQBZA
PQQKQ
PROAC
PT4
PT5
Q2X
QOK
QOS
R4E
R89
R9I
RHV
RIG
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCLPG
SCO
SCV
SDH
SDM
SHX
SISQX
SJN
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TN5
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
W7O
WK8
YLTOR
Z45
Z7R
Z7X
Z7Z
Z81
Z83
Z88
Z8M
Z8R
Z8T
Z8W
Z92
ZMTXR
_50
~A9
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
AETEA
AEZWR
AFDZB
AFFHD
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PQGLB
7SC
7SP
7XB
8AL
8FD
8FK
JQ2
L.-
L7M
L~C
L~D
PKEHL
PQEST
PQUKI
PRINS
Q9U
ID FETCH-LOGICAL-c319t-5eb481d7b8349d68f6acecb501b87aac5599e6f08cceeecce32d90652f675e93
IEDL.DBID M0C
ISICitedReferencesCount 51
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000716371500008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1383-469X
IngestDate Wed Nov 05 00:26:09 EST 2025
Sat Nov 29 03:18:15 EST 2025
Tue Nov 18 22:24:17 EST 2025
Fri Feb 21 02:47:42 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 6
Keywords IoT service composition
Privacy requirements
BPEL verification
Timed automata
User interactions
UPPAAL
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c319t-5eb481d7b8349d68f6acecb501b87aac5599e6f08cceeecce32d90652f675e93
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-6861-9684
PQID 2628405406
PQPubID 26070
PageCount 26
ParticipantIDs proquest_journals_2628405406
crossref_citationtrail_10_1007_s11036_021_01846_x
crossref_primary_10_1007_s11036_021_01846_x
springer_journals_10_1007_s11036_021_01846_x
PublicationCentury 2000
PublicationDate 20211200
2021-12-00
20211201
PublicationDateYYYYMMDD 2021-12-01
PublicationDate_xml – month: 12
  year: 2021
  text: 20211200
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationSubtitle The Journal of SPECIAL ISSUES on Mobility of Systems, Users, Data and Computing
PublicationTitle Mobile networks and applications
PublicationTitleAbbrev Mobile Netw Appl
PublicationYear 2021
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References ChamaIEBelalaNSaidouniDEA timed semantics for web services compositionInternational Journal of Business Process Integration and Management201781647910.1504/IJBPIM.2017.082765
Song D, Wagner D, Tian X et al (2001) Timing analysis of keystrokes and timing attacks on SSH. Usenix Security Symposium, pp 25–25
Liu L, Huang Z, Xiao F et al (2010) Verification of privacy requirements in web services composition. International Symposium on Data, Privacy, and E-Commerce, pp 117–122
LeeIJLeeKThe Internet of Things (IoT): applications, investments, and challenges for enterprisesBusiness Horizons201558443144010.1016/j.bushor.2015.03.008
Lemoine F, Aubonnet t, Simoni N (2020) IoT composition based on self-controlled services. Journal of Ambient Intelligence and Humanized Computing 11: 5167–5186
UPPALL (2019) UPPAAL web help. https://www.it.uu.se/research/group/darts/uppaal/help.php?file=WebHelp
Song W, Ma X, Ye C et al (2009) Timed modeling and verification of BPEL processes using time petri nets. International Conference on Quality Software, pp 92–97
Chama IE, Belala N, Saidouni DE et al (2014) Formalization and analysis of timed BPEL. Information Reuse and Integration, pp 483–491
Labda W, Mehandjiev N, Sampaio P et al (2014) Modeling of privacy-aware business processes in BPMN to protect personal data. ACM Symposium on Applied Computing, pp 1399–1405
Erl T (2008) SOA Principles of Service Design (Prentice Hall)
Li YH, Paik H, Benatallah B et al (2006) Formal consistency verification between BPEL process and privacy policy. Conference on Privacy, Security and Trust
JangjaccardJNepalSA survey of emerging threats in cybersecurityJ Comput Syst Sci2014805973993318330110.1016/j.jcss.2014.02.005
WeberRHInternet of things: new security and privacy challengesThe Internet of Things2010261233010.1007/978-3-642-11710-7_2
GaoHHuangWDuanYYangXZouQResearch on cost-driven services composition in an uncertain environmentJournal of Internet Technology (JIT)2019203755769
RomanRNajeraPLopezJSecuring the internet of thingsIEEE Computer2011449515810.1109/MC.2011.291
Butun I (2017) Privacy and trust relations in Internet of Things from the user point of view. IEEE Annual Computing and Communication Workshop and Conference, pp 1–5
David A, Larsen KG, Legay A et al (2010) Timed I/O automata: a complete specification theory for real-time systems. ACM International Conference Hybrid Systems Computation and Control, pp 91–100
Felten EW, Schneider MA (2000) Timing attacks on Web privacy. Computer and Communications Security, pp 25–32
Alur R, Courcoubetis C, Dill D (1990) Model-checking for real-time systems. Proceedings. Fifth Annual IEEE Symposium on Logic in Computer Science, Philadelphia, PA, USA, pp 414– 425
Mateescu R, Rampacek S (2008) Formal modeling and discrete-time analysis of BPEL web services. In: Dietzj LG, Albani A, Barjis J (eds) Advances in enterprise engineering i. CIAO! 2008, EOMAS 2008. Lecture notes in business information processing, vol 10. Springer, Berlin
GaoHChuDDuanYThe probabilistic model checking based service selection method for business process modelingJournal of Software Engineering and Knowledge Engineering201727689792310.1142/S0218194017500334
GaoHMiaoHLiuLAutomated quantitative verification for service-based system design: a visualization transform tool perspectiveInternational Journal of Software Engineering and Knowledge Engineering201828101369139710.1142/S0218194018500390
HonghaoGHuaikouMHongweiZPredictive web service monitoring using probabilistic model checkingApplied Mathematics & Information Sciences201371L139148299849410.12785/amis/071L20
Fares E, Bodeveix JP, Filali M et al (2011) Verification of timed BPEL 2.0 models. In: Halpin T (ed) Enterprise, business-process and information systems modeling. BPMDS 2011, EMMSAD 2011. Lecture notes in business information processing, vol 81. Springer, Berlin
LuJHuangZKeCVerification of behavior-aware privacy requirements in web services compositionJournal of Software201494944951
ConstanteEPaciFZannoneNPrivacy-aware web service composition and rankingInternational Conference on Web Services2013103131138
Bertino E (2016) Data privacy for IoT systems: concepts, approaches, and research directions. International Conference on Big Data, pp 3645–3647
BhatiaRGujralMSPrivacy aware access control: a literature survey and novel frameworkInternational Journal of Information Technologies and Systems Approach2017102173010.4018/IJITSA.2017070102
OASIS WS-BPEL Technical Committee, Web Services Business Process Execution Language Version 2.0 (2007). http://docs.oasis-open.org/wsbpel/2.0/OS/wsbpel-v2.0-OS.html
Focardi R, Gorrieri R, Lanotte R et al (2002) Formal models of timing attacks on web privacy. Electronic Notes in Theoretical Computer Science, pp 229–243
Joshaghani R, Black S, Sherman E et al (2019) Formal specification and verification of user-centric privacy policies for ubiquitous systems. International Database Engineering and Applications Symposium
1846_CR8
1846_CR7
G Honghao (1846_CR19) 2013; 7
J Jangjaccard (1846_CR3) 2014; 80
1846_CR5
J LeeI (1846_CR2) 2015; 58
H Gao (1846_CR20) 2017; 27
1846_CR29
1846_CR28
1846_CR26
H Gao (1846_CR31) 2018; 28
1846_CR24
1846_CR23
1846_CR22
1846_CR1
R Roman (1846_CR6) 2011; 44
IE Chama (1846_CR30) 2017; 8
E Constante (1846_CR4) 2013; 10
J Lu (1846_CR25) 2014; 9
cr-split#-1846_CR27.2
cr-split#-1846_CR27.1
H Gao (1846_CR21) 2019; 20
1846_CR18
1846_CR17
1846_CR16
1846_CR15
RH Weber (1846_CR9) 2010; 26
R Bhatia (1846_CR10) 2017; 10
1846_CR14
1846_CR13
1846_CR12
1846_CR11
References_xml – reference: Song D, Wagner D, Tian X et al (2001) Timing analysis of keystrokes and timing attacks on SSH. Usenix Security Symposium, pp 25–25
– reference: ConstanteEPaciFZannoneNPrivacy-aware web service composition and rankingInternational Conference on Web Services2013103131138
– reference: UPPALL (2019) UPPAAL web help. https://www.it.uu.se/research/group/darts/uppaal/help.php?file=WebHelp
– reference: WeberRHInternet of things: new security and privacy challengesThe Internet of Things2010261233010.1007/978-3-642-11710-7_2
– reference: Bertino E (2016) Data privacy for IoT systems: concepts, approaches, and research directions. International Conference on Big Data, pp 3645–3647
– reference: BhatiaRGujralMSPrivacy aware access control: a literature survey and novel frameworkInternational Journal of Information Technologies and Systems Approach2017102173010.4018/IJITSA.2017070102
– reference: RomanRNajeraPLopezJSecuring the internet of thingsIEEE Computer2011449515810.1109/MC.2011.291
– reference: Li YH, Paik H, Benatallah B et al (2006) Formal consistency verification between BPEL process and privacy policy. Conference on Privacy, Security and Trust
– reference: Felten EW, Schneider MA (2000) Timing attacks on Web privacy. Computer and Communications Security, pp 25–32
– reference: Joshaghani R, Black S, Sherman E et al (2019) Formal specification and verification of user-centric privacy policies for ubiquitous systems. International Database Engineering and Applications Symposium
– reference: Liu L, Huang Z, Xiao F et al (2010) Verification of privacy requirements in web services composition. International Symposium on Data, Privacy, and E-Commerce, pp 117–122
– reference: Labda W, Mehandjiev N, Sampaio P et al (2014) Modeling of privacy-aware business processes in BPMN to protect personal data. ACM Symposium on Applied Computing, pp 1399–1405
– reference: OASIS WS-BPEL Technical Committee, Web Services Business Process Execution Language Version 2.0 (2007). http://docs.oasis-open.org/wsbpel/2.0/OS/wsbpel-v2.0-OS.html
– reference: Lemoine F, Aubonnet t, Simoni N (2020) IoT composition based on self-controlled services. Journal of Ambient Intelligence and Humanized Computing 11: 5167–5186
– reference: Alur R, Courcoubetis C, Dill D (1990) Model-checking for real-time systems. Proceedings. Fifth Annual IEEE Symposium on Logic in Computer Science, Philadelphia, PA, USA, pp 414– 425
– reference: Fares E, Bodeveix JP, Filali M et al (2011) Verification of timed BPEL 2.0 models. In: Halpin T (ed) Enterprise, business-process and information systems modeling. BPMDS 2011, EMMSAD 2011. Lecture notes in business information processing, vol 81. Springer, Berlin
– reference: JangjaccardJNepalSA survey of emerging threats in cybersecurityJ Comput Syst Sci2014805973993318330110.1016/j.jcss.2014.02.005
– reference: LeeIJLeeKThe Internet of Things (IoT): applications, investments, and challenges for enterprisesBusiness Horizons201558443144010.1016/j.bushor.2015.03.008
– reference: Focardi R, Gorrieri R, Lanotte R et al (2002) Formal models of timing attacks on web privacy. Electronic Notes in Theoretical Computer Science, pp 229–243
– reference: GaoHMiaoHLiuLAutomated quantitative verification for service-based system design: a visualization transform tool perspectiveInternational Journal of Software Engineering and Knowledge Engineering201828101369139710.1142/S0218194018500390
– reference: Erl T (2008) SOA Principles of Service Design (Prentice Hall)
– reference: HonghaoGHuaikouMHongweiZPredictive web service monitoring using probabilistic model checkingApplied Mathematics & Information Sciences201371L139148299849410.12785/amis/071L20
– reference: Butun I (2017) Privacy and trust relations in Internet of Things from the user point of view. IEEE Annual Computing and Communication Workshop and Conference, pp 1–5
– reference: LuJHuangZKeCVerification of behavior-aware privacy requirements in web services compositionJournal of Software201494944951
– reference: Song W, Ma X, Ye C et al (2009) Timed modeling and verification of BPEL processes using time petri nets. International Conference on Quality Software, pp 92–97
– reference: GaoHChuDDuanYThe probabilistic model checking based service selection method for business process modelingJournal of Software Engineering and Knowledge Engineering201727689792310.1142/S0218194017500334
– reference: Mateescu R, Rampacek S (2008) Formal modeling and discrete-time analysis of BPEL web services. In: Dietzj LG, Albani A, Barjis J (eds) Advances in enterprise engineering i. CIAO! 2008, EOMAS 2008. Lecture notes in business information processing, vol 10. Springer, Berlin
– reference: Chama IE, Belala N, Saidouni DE et al (2014) Formalization and analysis of timed BPEL. Information Reuse and Integration, pp 483–491
– reference: David A, Larsen KG, Legay A et al (2010) Timed I/O automata: a complete specification theory for real-time systems. ACM International Conference Hybrid Systems Computation and Control, pp 91–100
– reference: ChamaIEBelalaNSaidouniDEA timed semantics for web services compositionInternational Journal of Business Process Integration and Management201781647910.1504/IJBPIM.2017.082765
– reference: GaoHHuangWDuanYYangXZouQResearch on cost-driven services composition in an uncertain environmentJournal of Internet Technology (JIT)2019203755769
– ident: 1846_CR13
– ident: 1846_CR16
  doi: 10.1109/LICS.1990.113766
– ident: 1846_CR8
  doi: 10.1109/CCWC.2017.7868419
– ident: 1846_CR1
  doi: 10.1007/s12652-020-01831-4
– volume: 26
  start-page: 23
  issue: 1
  year: 2010
  ident: 1846_CR9
  publication-title: The Internet of Things
  doi: 10.1007/978-3-642-11710-7_2
– volume: 44
  start-page: 51
  issue: 9
  year: 2011
  ident: 1846_CR6
  publication-title: IEEE Computer
  doi: 10.1109/MC.2011.291
– volume: 10
  start-page: 17
  issue: 2
  year: 2017
  ident: 1846_CR10
  publication-title: International Journal of Information Technologies and Systems Approach
  doi: 10.4018/IJITSA.2017070102
– ident: #cr-split#-1846_CR27.2
– ident: 1846_CR28
  doi: 10.1109/QSIC.2009.20
– ident: 1846_CR24
  doi: 10.1109/ISDPE.2010.25
– ident: #cr-split#-1846_CR27.1
  doi: 10.1007/978-3-642-21759-3_19
– ident: 1846_CR7
  doi: 10.1109/BigData.2016.7841030
– ident: 1846_CR17
  doi: 10.1016/S1571-0661(04)00329-9
– ident: 1846_CR29
  doi: 10.1109/IRI.2014.7051928
– volume: 8
  start-page: 64
  issue: 1
  year: 2017
  ident: 1846_CR30
  publication-title: International Journal of Business Process Integration and Management
  doi: 10.1504/IJBPIM.2017.082765
– ident: 1846_CR11
– volume: 27
  start-page: 897
  issue: 6
  year: 2017
  ident: 1846_CR20
  publication-title: Journal of Software Engineering and Knowledge Engineering
  doi: 10.1142/S0218194017500334
– ident: 1846_CR12
– volume: 58
  start-page: 431
  issue: 4
  year: 2015
  ident: 1846_CR2
  publication-title: Business Horizons
  doi: 10.1016/j.bushor.2015.03.008
– volume: 9
  start-page: 944
  issue: 4
  year: 2014
  ident: 1846_CR25
  publication-title: Journal of Software
– volume: 28
  start-page: 1369
  issue: 10
  year: 2018
  ident: 1846_CR31
  publication-title: International Journal of Software Engineering and Knowledge Engineering
  doi: 10.1142/S0218194018500390
– ident: 1846_CR23
  doi: 10.1145/1501434.1501466
– ident: 1846_CR22
  doi: 10.1145/3331076.3331105
– ident: 1846_CR14
  doi: 10.1145/1755952.1755967
– volume: 7
  start-page: 139
  issue: 1L
  year: 2013
  ident: 1846_CR19
  publication-title: Applied Mathematics & Information Sciences
  doi: 10.12785/amis/071L20
– volume: 10
  start-page: 131
  issue: 3
  year: 2013
  ident: 1846_CR4
  publication-title: International Conference on Web Services
– volume: 80
  start-page: 973
  issue: 5
  year: 2014
  ident: 1846_CR3
  publication-title: J Comput Syst Sci
  doi: 10.1016/j.jcss.2014.02.005
– ident: 1846_CR26
  doi: 10.1007/978-3-540-68644-6_13
– ident: 1846_CR15
  doi: 10.1145/352600.352606
– ident: 1846_CR5
  doi: 10.1145/2554850.2555014
– ident: 1846_CR18
– volume: 20
  start-page: 755
  issue: 3
  year: 2019
  ident: 1846_CR21
  publication-title: Journal of Internet Technology (JIT)
SSID ssj0005584
Score 2.5153284
Snippet With the development of the Internet of Things (IoT) and the Internet, new kinds of services based on IoT devices will benefit everyone. As a key step in...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 2272
SubjectTerms Algorithms
Business Process Execution Language
Communications Engineering
Composition effects
Computer Communication Networks
Electrical Engineering
Engineering
Internet of Things
IT in Business
Networks
Privacy
Verification
SummonAdditionalLinks – databaseName: SpringerLINK Contemporary 1997-Present
  dbid: RSV
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEA6iHvTgW1xfzMGbFrbtNk29rS8URBetsreSpCkIspXdKvp7_KPOZFOrooKeO01LMsl8Seabj7GdhDC6ipWX60B6nZyE3BF3eLEhoaTIxL60I30eX1yIfj_pOVLYqM52r68k7UrdkN18Kp5LKQVt3JZwD5HjFIY7QYINV9e3TWJHJMZStiL0cPPXd1SZ79v4HI4ajPnlWtRGm5P5__3nAptz6BK6Y3dYZBNmsMRmP9QcXGav10fp2WV3H0gFjbjogBAQiAmSQ2949yT1C1wZyg-2B4cjKAs4K1NwiwrQAuISvfahCzfowmCPFccMCeg17E1AQAzdx6q0ZWEh_YCR0ZCILXDQOz6HqnTfd7ZyhaUnx-nhqeeUGjyNU7jyIqM6CHxjJcJOknNRcKmNVlHbVyKWUlNZM8OLttAYk9FpTBjkCYKfoMD9iknCVTY5KAdmjUEkRaJDxaUKeUe2uVKFECRf4eehL2XRYn49Xpl2VcxJTOM-a-ovU_9n2P-Z7f_sucV23995GNfw-NV6s3aDzM3nURZwDOOEbnmL7dXD3jz-ubX1v5lvsJmAPMfmy2yyyWr4aLbYtH6q7kbDbevnbxdQ-cE
  priority: 102
  providerName: Springer Nature
Title SDTIOA: Modeling the Timed Privacy Requirements of IoT Service Composition: A User Interaction Perspective for Automatic Transformation from BPEL to Timed Automata
URI https://link.springer.com/article/10.1007/s11036-021-01846-x
https://www.proquest.com/docview/2628405406
Volume 26
WOSCitedRecordID wos000716371500008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 1572-8153
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0005584
  issn: 1383-469X
  databaseCode: RSV
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lb9QwEB7RlgMceCO2lNUcuIFFHhvH6QVty1ZUlCXaBlh6iWzHkSqhTbubVuX38EfxOF5SkOiFi6UojmNpxuPP45n5AF5mhNFVqlilI8lGFRG5W9zBUkNESYlJQ-kkfZROp2I-z3LvcFv5sMq1TXSGumo0-cjfRNwaUsIX_O3ZOSPWKLpd9RQaG7BFyIZC-j4G-32IRyI6UlsRM3sMnPukmS51LqRSvBSgENhDDmdXf25MPdr864LU7TsH9_93xg_gnkecOO5U5CHcMotHcPdaHcLH8PP4XXH4abyLxIxG-eloYSFSdkiF-fL0UuofODMUM-yciStsajxsCvSGBsmo-OCvXRzjZ6vW6FyNXdYE5n1GJ1qQjOOLtnGlYrG4hpttR0p2wb18coRt4__v-8onUBxMiv33zLM3MG2XdcsSo0YWDKdKxKOs4qLmUhutkiBUIpVSU6kzw-tAaLtPW0UycVRlFhBFtT3DmCx-CpuLZmGeASZSZDpWXKqYj2TAlaqFIEqLsIpDKesBhGvJldpXNieCje9lX5OZpF1aaZdO2uXVAF79_uasq-txY--dtYhLv8ZXZS_fAbxeK0n_-t-jbd882nO4E5FeupiZHdhslxfmBdzWl-3pajmEjfTrtyFs7U2m-cw-fUjZ0Gm9bfPkxLaz4y-_ADjmCHY
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwELaqggQceCO2FJgDnMBi83KcSggttFVXuywrCNLeLNtxpEpo0-6mpf09nPmPzCQOKUj01gPnOI5if_OyZ-Zj7EVGPrpJDS9sqHlcEJE7-h08dUSUlLg00M1OT9PZTC4W2XyD_exqYSitstOJjaIuKktn5G9CgYqU_Avx7uiYE2sU3a52FBotLCbu_DuGbOu3413c35dhuL-XfzjgnlWAW4RbzRNnYnTSUiOjOCuELIW2zppkGBiZam2pBZcT5VBatB_4gy4KiwwNdViib-2o9xJq_GtxJFMSq0nK-4ySRLYcujLiGHUufI1OW6kXUOdfyocYYkwl-NmfdrB3bv-6j23M3P6d_2yB7rLb3p-GUSsA99iGW95nty50WXzAfnzZzcefRjtAvG9UfQ_o9ALVvhQwXx2eansOnx1lRDdHpWuoShhXOXg1CqQyfWrbDozgKwotNAepbU0IzPt6VcAQAEYnddU0woX8QlSAA6mUB97P96ZQV_77fqx-yPKrWKRHbHNZLd1jBomWmY2M0CYSsR4KY0opibAjKKJA63LAgg4oyvq-7UQf8k31HacJXArBpRpwqbMBe_X7naO2a8mlo7c7RCmvwdaqh9OAve4w2T_-92xbl8_2nN04yD9O1XQ8mzxhN0MSiSY7aJtt1qsT95Rdt6f14Xr1rBEuYOqKsfoLCU9hbQ
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V3NbtQwELaqghAc-EcsFJgDnMDqJtk4TiWEFrYrVl0tEQRpxcWyHUeqhDZlNy3t8_AUvB0ziUMKEr31wNmOo8Tf_Nkz8zH2PCUf3SSGFzbUfFQQkTv6HTxxRJQUuyTQzU7Pk8VCLpdptsV-drUwlFbZ6cRGUReVpTPy3VCgIiX_QuyWPi0im0zfHH3jxCBFN60dnUYLkQN39h3Dt83r2QT3-kUYTvfzd--5ZxjgFqFX89iZETpsiZHRKC2ELIW2zpp4GBiZaG2pHZcT5VBatCX4sS4KixSNdliin-2oDxNq_ysJhpiUTZjFX_rskli2fLoy4ji89PU6bdVeQF2AKTdiiPGV4Kd_2sTe0f3rbrYxedNb__HPus1uej8bxq1g3GFbbnWX3TjXffEe-_Fpks8-jPeA-OCoKh_QGQaqiSkgWx-eaHsGHx1lSjdHqBuoSphVOXj1CqRKfcrbHozhMwozNAesba0IZH0dK2BoAOPjumoa5EJ-LlrAiVTiA2-z_TnUlX-_n6vvs_wyftIDtr2qVu4hg1jL1EZGaBOJkR4KY0opicgjKKJA63LAgg40yvp-7kQr8lX1nagJaAqBphqgqdMBe_n7maO2m8mFs3c6dCmv2Taqh9aAverw2Q__e7VHF6_2jF1DiKr5bHHwmF0PSTqapKEdtl2vj90TdtWe1Ieb9dNGzoCpS4bqLz3FapE
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=SDTIOA%3A+Modeling+the+Timed+Privacy+Requirements+of+IoT+Service+Composition%3A+A+User+Interaction+Perspective+for+Automatic+Transformation+from+BPEL+to+Timed+Automata&rft.jtitle=Mobile+networks+and+applications&rft.au=Gao+Honghao&rft.au=Zhang%2C+Yida&rft.au=Miao+Huaikou&rft.au=Barroso+Ram%C3%B3n+J+Dur%C3%A1n&rft.date=2021-12-01&rft.pub=Springer+Nature+B.V&rft.issn=1383-469X&rft.eissn=1572-8153&rft.volume=26&rft.issue=6&rft.spage=2272&rft.epage=2297&rft_id=info:doi/10.1007%2Fs11036-021-01846-x&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1383-469X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1383-469X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1383-469X&client=summon