SDTIOA: Modeling the Timed Privacy Requirements of IoT Service Composition: A User Interaction Perspective for Automatic Transformation from BPEL to Timed Automata
With the development of the Internet of Things (IoT) and the Internet, new kinds of services based on IoT devices will benefit everyone. As a key step in achieving a complex business structure based on a massive number of IoT devices, establishing an effective service composition is extremely import...
Saved in:
| Published in: | Mobile networks and applications Vol. 26; no. 6; pp. 2272 - 2297 |
|---|---|
| Main Authors: | , , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
New York
Springer US
01.12.2021
Springer Nature B.V |
| Subjects: | |
| ISSN: | 1383-469X, 1572-8153 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | With the development of the Internet of Things (IoT) and the Internet, new kinds of services based on IoT devices will benefit everyone. As a key step in achieving a complex business structure based on a massive number of IoT devices, establishing an effective service composition is extremely important. The emerging architecture of composition is related to process management and is subject to security risks, such as privacy leaks. Traditional service composition methods have difficulty verifying the timed privacy requirements of an IoT service composition. Therefore, this paper proposes an automatic method of transforming Business Process Execution Language (BPEL) into timed automata for formal verification, with the aim of formalizing timed privacy requirements for the IoT service composition and verifying the formal model returned to the UPPAAL supporting tool. First, a privacy requirement template is introduced to analyze the structure of the IoT service composition. Then, a timed computation tree logic (TCTL) property formula template is used to describe the privacy requirements, especially time constraints. Second, an extended timed I/O automata model, namely, the Sensitive Data Timed I/O Automata (SDTIOA) model, is proposed to formalize communication behavior, sensitive data treatment, and service time. Third, the corresponding transformation rules and algorithms are designed for BPEL and SDTIOA. These models can be adjusted through user interaction. Next, as a practical engineering application, we develop a prototype to show how to work with UPPAAL and generate UPPAAL code from SDTIOA code. Finally, a case study is discussed to illustrate the processes of modeling and timed verification for an IoT service composition. |
|---|---|
| AbstractList | With the development of the Internet of Things (IoT) and the Internet, new kinds of services based on IoT devices will benefit everyone. As a key step in achieving a complex business structure based on a massive number of IoT devices, establishing an effective service composition is extremely important. The emerging architecture of composition is related to process management and is subject to security risks, such as privacy leaks. Traditional service composition methods have difficulty verifying the timed privacy requirements of an IoT service composition. Therefore, this paper proposes an automatic method of transforming Business Process Execution Language (BPEL) into timed automata for formal verification, with the aim of formalizing timed privacy requirements for the IoT service composition and verifying the formal model returned to the UPPAAL supporting tool. First, a privacy requirement template is introduced to analyze the structure of the IoT service composition. Then, a timed computation tree logic (TCTL) property formula template is used to describe the privacy requirements, especially time constraints. Second, an extended timed I/O automata model, namely, the Sensitive Data Timed I/O Automata (SDTIOA) model, is proposed to formalize communication behavior, sensitive data treatment, and service time. Third, the corresponding transformation rules and algorithms are designed for BPEL and SDTIOA. These models can be adjusted through user interaction. Next, as a practical engineering application, we develop a prototype to show how to work with UPPAAL and generate UPPAAL code from SDTIOA code. Finally, a case study is discussed to illustrate the processes of modeling and timed verification for an IoT service composition. |
| Author | Miao, Huaikou Gao, Honghao Yang, Xiaoxian Zhang, Yida Barroso, Ramón J. Durán |
| Author_xml | – sequence: 1 givenname: Honghao orcidid: 0000-0001-6861-9684 surname: Gao fullname: Gao, Honghao organization: School of Computer Engineering and Science, Shanghai University – sequence: 2 givenname: Yida surname: Zhang fullname: Zhang, Yida organization: School of Computer Engineering and Science, Shanghai University – sequence: 3 givenname: Huaikou surname: Miao fullname: Miao, Huaikou organization: School of Computer Engineering and Science, Shanghai University – sequence: 4 givenname: Ramón J. Durán surname: Barroso fullname: Barroso, Ramón J. Durán organization: Faculty of Telecommunication Engineering, University of Valladolid – sequence: 5 givenname: Xiaoxian surname: Yang fullname: Yang, Xiaoxian email: xxyang@sspu.edu.cn organization: School of Computer and Information Engineering, Shanghai Polytechnic University |
| BookMark | eNp9kcFOGzEQhq0KpALtC3Aaqedt7d2118stTaFECiKCrcTNcryz1ChrB9uJ4Hn6onVIpEo9cLHHo-_z2PpPyZHzDgk5Z_Qro7T5FhmjlShoyQrKZC2Klw_khPGmLCTj1VGuK1kVtWgfPpLTGJ8opZzL-oT8uf_RzW4nF3Dje1xZ9wjpN0JnR-xhEexWm1e4w-eNDTiiSxH8ADPfwT2GrTUIUz-ufbTJencBE_gVMcDMJQza7HqwwBDXmOstwuADTDbJjzpZA13QLubW7pTBIfgRvi8u55D8Yf6B1Z_I8aBXET8f9jPSXV120-tifvtzNp3MC1OxNhUcl7VkfbOUVd32Qg5CGzRLTtlSNlobztsWxUClMYiYl6rsWyp4OYiGY1udkS_7a9fBP28wJvXkN8HliaoUpawpr6nIlNxTJvgYAw7K2PT2hRS0XSlG1S4RtU9E5UTUWyLqJavlf-o62FGH1_elai_FDLtHDP9e9Y71F9jgo6s |
| CitedBy_id | crossref_primary_10_1049_cmu2_12371 crossref_primary_10_1155_2022_3086516 crossref_primary_10_1186_s13638_022_02137_z crossref_primary_10_1186_s13638_022_02139_x crossref_primary_10_1002_spe_3372 crossref_primary_10_1093_comjnl_bxac119 crossref_primary_10_3390_cryptography7020030 crossref_primary_10_1155_2022_2440313 crossref_primary_10_1007_s11036_022_02039_w crossref_primary_10_1155_2022_4193365 crossref_primary_10_1007_s11036_022_01972_0 crossref_primary_10_1093_comjnl_bxac131 crossref_primary_10_1007_s11276_021_02870_1 crossref_primary_10_1007_s11227_023_05388_9 crossref_primary_10_1186_s13638_022_02132_4 crossref_primary_10_1186_s13638_022_02135_1 crossref_primary_10_1002_ett_4515 crossref_primary_10_1016_j_knosys_2023_110463 crossref_primary_10_1049_cmu2_12507 crossref_primary_10_3390_math11163477 crossref_primary_10_1002_dac_5229 crossref_primary_10_1155_2022_2578744 crossref_primary_10_1111_exsy_12975 crossref_primary_10_1007_s11276_021_02878_7 crossref_primary_10_1111_exsy_12977 crossref_primary_10_1080_03081079_2024_2345876 crossref_primary_10_1109_TCE_2025_3526427 crossref_primary_10_1155_2022_7359134 crossref_primary_10_1093_comjnl_bxac124 crossref_primary_10_1007_s11036_022_01977_9 crossref_primary_10_1007_s00500_023_09530_w crossref_primary_10_1007_s12083_022_01343_2 crossref_primary_10_1007_s11036_022_02010_9 crossref_primary_10_1007_s11036_022_02012_7 crossref_primary_10_1007_s11276_022_03203_6 crossref_primary_10_1109_TITS_2022_3157447 crossref_primary_10_1155_2022_4943218 crossref_primary_10_1093_comjnl_bxac060 crossref_primary_10_1007_s11036_022_01974_y crossref_primary_10_1007_s11036_022_01976_w crossref_primary_10_3390_electronics11142117 crossref_primary_10_1049_cmu2_12379 crossref_primary_10_1186_s13638_022_02100_y crossref_primary_10_1186_s13638_022_02148_w |
| Cites_doi | 10.1109/LICS.1990.113766 10.1109/CCWC.2017.7868419 10.1007/s12652-020-01831-4 10.1007/978-3-642-11710-7_2 10.1109/MC.2011.291 10.4018/IJITSA.2017070102 10.1109/QSIC.2009.20 10.1109/ISDPE.2010.25 10.1007/978-3-642-21759-3_19 10.1109/BigData.2016.7841030 10.1016/S1571-0661(04)00329-9 10.1109/IRI.2014.7051928 10.1504/IJBPIM.2017.082765 10.1142/S0218194017500334 10.1016/j.bushor.2015.03.008 10.1142/S0218194018500390 10.1145/1501434.1501466 10.1145/3331076.3331105 10.1145/1755952.1755967 10.12785/amis/071L20 10.1016/j.jcss.2014.02.005 10.1007/978-3-540-68644-6_13 10.1145/352600.352606 10.1145/2554850.2555014 |
| ContentType | Journal Article |
| Copyright | The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021. |
| Copyright_xml | – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021. |
| DBID | AAYXX CITATION 3V. 7SC 7SP 7WY 7WZ 7XB 87Z 8AL 8AO 8FD 8FE 8FG 8FK 8FL ABUWG AFKRA ARAPS AZQEC BENPR BEZIV BGLVJ CCPQU DWQXO FRNLG F~G GNUQQ HCIFZ JQ2 K60 K6~ K7- L.- L7M L~C L~D M0C M0N P5Z P62 PHGZM PHGZT PKEHL PQBIZ PQBZA PQEST PQGLB PQQKQ PQUKI PRINS Q9U |
| DOI | 10.1007/s11036-021-01846-x |
| DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts Electronics & Communications Abstracts ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection Computing Database (Alumni Edition) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni Edition) ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Business Premium Collection Technology collection ProQuest One Community College ProQuest Central Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global Computing Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Databases ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Business (UW System Shared) ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic |
| DatabaseTitle | CrossRef ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest One Business Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Pharma Collection ProQuest Central China ABI/INFORM Complete ProQuest Central ABI/INFORM Professional Advanced ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace ABI/INFORM Complete (Alumni Edition) Advanced Technologies & Aerospace Collection Business Premium Collection ABI/INFORM Global ProQuest Computing ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition Electronics & Communications Abstracts ProQuest Technology Collection ProQuest SciTech Collection ProQuest Business Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Business (Alumni) ProQuest One Academic ProQuest Central (Alumni) ProQuest One Academic (New) Business Premium Collection (Alumni) |
| DatabaseTitleList | ABI/INFORM Global (Corporate) |
| Database_xml | – sequence: 1 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1572-8153 |
| EndPage | 2297 |
| ExternalDocumentID | 10_1007_s11036_021_01846_x |
| GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 61902236 funderid: https://doi.org/10.13039/501100001809 |
| GroupedDBID | -59 -5G -BR -EM -Y2 -~C -~X .4S .86 .DC .VR 06D 0R~ 0VY 123 1N0 1SB 2.D 203 28- 29M 29~ 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 3V. 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 7WY 85S 8AO 8FE 8FG 8FL 8FW 8TC 8UJ 8US 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYOK AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACAOD ACBXY ACDTI ACGFO ACGFS ACHSB ACHXU ACKNC ACM ACMDZ ACMLO ACOKC ACOMO ACPIV ACREN ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADL ADMLS ADRFC ADTPH ADURQ ADYFF ADYOE ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFEXP AFFNX AFGCZ AFKRA AFLOW AFQWF AFWTZ AFYQB AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMTXH AMXSW AMYLF AMYQR AOCGG ARAPS ARCEE ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN AZQEC B-. BA0 BBWZM BDATZ BENPR BEZIV BGLVJ BGNMA BPHCQ BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DWQXO EBLON EBS EDO EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRNLG FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ6 GQ7 GQ8 GROUPED_ABI_INFORM_COMPLETE GROUPED_ABI_INFORM_RESEARCH GXS H13 HCIFZ HF~ HG5 HG6 HGAVV HMJXF HQYDN HRMNR HVGLF HZ~ I-F I07 I09 IHE IJ- IKXTQ ITG ITH ITM IWAJR IXC IXE IZIGR IZQ I~X I~Y I~Z J-C J0Z JBSCW JCJTX JZLTJ K60 K6V K6~ K7- KDC KOV KOW LAK LLZTM M0C M0N M4Y MA- N2Q NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P2P P62 P9O PF0 PQBIZ PQBZA PQQKQ PROAC PT4 PT5 Q2X QOK QOS R4E R89 R9I RHV RIG RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCLPG SCO SCV SDH SDM SHX SISQX SJN SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TN5 TSG TSK TSV TUC TUS U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 W7O WK8 YLTOR Z45 Z7R Z7X Z7Z Z81 Z83 Z88 Z8M Z8R Z8T Z8W Z92 ZMTXR _50 ~A9 ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG AETEA AEZWR AFDZB AFFHD AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT PQGLB 7SC 7SP 7XB 8AL 8FD 8FK JQ2 L.- L7M L~C L~D PKEHL PQEST PQUKI PRINS Q9U |
| ID | FETCH-LOGICAL-c319t-5eb481d7b8349d68f6acecb501b87aac5599e6f08cceeecce32d90652f675e93 |
| IEDL.DBID | M0C |
| ISICitedReferencesCount | 51 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000716371500008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1383-469X |
| IngestDate | Wed Nov 05 00:26:09 EST 2025 Sat Nov 29 03:18:15 EST 2025 Tue Nov 18 22:24:17 EST 2025 Fri Feb 21 02:47:42 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 6 |
| Keywords | IoT service composition Privacy requirements BPEL verification Timed automata User interactions UPPAAL |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c319t-5eb481d7b8349d68f6acecb501b87aac5599e6f08cceeecce32d90652f675e93 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0001-6861-9684 |
| PQID | 2628405406 |
| PQPubID | 26070 |
| PageCount | 26 |
| ParticipantIDs | proquest_journals_2628405406 crossref_citationtrail_10_1007_s11036_021_01846_x crossref_primary_10_1007_s11036_021_01846_x springer_journals_10_1007_s11036_021_01846_x |
| PublicationCentury | 2000 |
| PublicationDate | 20211200 2021-12-00 20211201 |
| PublicationDateYYYYMMDD | 2021-12-01 |
| PublicationDate_xml | – month: 12 year: 2021 text: 20211200 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationSubtitle | The Journal of SPECIAL ISSUES on Mobility of Systems, Users, Data and Computing |
| PublicationTitle | Mobile networks and applications |
| PublicationTitleAbbrev | Mobile Netw Appl |
| PublicationYear | 2021 |
| Publisher | Springer US Springer Nature B.V |
| Publisher_xml | – name: Springer US – name: Springer Nature B.V |
| References | ChamaIEBelalaNSaidouniDEA timed semantics for web services compositionInternational Journal of Business Process Integration and Management201781647910.1504/IJBPIM.2017.082765 Song D, Wagner D, Tian X et al (2001) Timing analysis of keystrokes and timing attacks on SSH. Usenix Security Symposium, pp 25–25 Liu L, Huang Z, Xiao F et al (2010) Verification of privacy requirements in web services composition. International Symposium on Data, Privacy, and E-Commerce, pp 117–122 LeeIJLeeKThe Internet of Things (IoT): applications, investments, and challenges for enterprisesBusiness Horizons201558443144010.1016/j.bushor.2015.03.008 Lemoine F, Aubonnet t, Simoni N (2020) IoT composition based on self-controlled services. Journal of Ambient Intelligence and Humanized Computing 11: 5167–5186 UPPALL (2019) UPPAAL web help. https://www.it.uu.se/research/group/darts/uppaal/help.php?file=WebHelp Song W, Ma X, Ye C et al (2009) Timed modeling and verification of BPEL processes using time petri nets. International Conference on Quality Software, pp 92–97 Chama IE, Belala N, Saidouni DE et al (2014) Formalization and analysis of timed BPEL. Information Reuse and Integration, pp 483–491 Labda W, Mehandjiev N, Sampaio P et al (2014) Modeling of privacy-aware business processes in BPMN to protect personal data. ACM Symposium on Applied Computing, pp 1399–1405 Erl T (2008) SOA Principles of Service Design (Prentice Hall) Li YH, Paik H, Benatallah B et al (2006) Formal consistency verification between BPEL process and privacy policy. Conference on Privacy, Security and Trust JangjaccardJNepalSA survey of emerging threats in cybersecurityJ Comput Syst Sci2014805973993318330110.1016/j.jcss.2014.02.005 WeberRHInternet of things: new security and privacy challengesThe Internet of Things2010261233010.1007/978-3-642-11710-7_2 GaoHHuangWDuanYYangXZouQResearch on cost-driven services composition in an uncertain environmentJournal of Internet Technology (JIT)2019203755769 RomanRNajeraPLopezJSecuring the internet of thingsIEEE Computer2011449515810.1109/MC.2011.291 Butun I (2017) Privacy and trust relations in Internet of Things from the user point of view. IEEE Annual Computing and Communication Workshop and Conference, pp 1–5 David A, Larsen KG, Legay A et al (2010) Timed I/O automata: a complete specification theory for real-time systems. ACM International Conference Hybrid Systems Computation and Control, pp 91–100 Felten EW, Schneider MA (2000) Timing attacks on Web privacy. Computer and Communications Security, pp 25–32 Alur R, Courcoubetis C, Dill D (1990) Model-checking for real-time systems. Proceedings. Fifth Annual IEEE Symposium on Logic in Computer Science, Philadelphia, PA, USA, pp 414– 425 Mateescu R, Rampacek S (2008) Formal modeling and discrete-time analysis of BPEL web services. In: Dietzj LG, Albani A, Barjis J (eds) Advances in enterprise engineering i. CIAO! 2008, EOMAS 2008. Lecture notes in business information processing, vol 10. Springer, Berlin GaoHChuDDuanYThe probabilistic model checking based service selection method for business process modelingJournal of Software Engineering and Knowledge Engineering201727689792310.1142/S0218194017500334 GaoHMiaoHLiuLAutomated quantitative verification for service-based system design: a visualization transform tool perspectiveInternational Journal of Software Engineering and Knowledge Engineering201828101369139710.1142/S0218194018500390 HonghaoGHuaikouMHongweiZPredictive web service monitoring using probabilistic model checkingApplied Mathematics & Information Sciences201371L139148299849410.12785/amis/071L20 Fares E, Bodeveix JP, Filali M et al (2011) Verification of timed BPEL 2.0 models. In: Halpin T (ed) Enterprise, business-process and information systems modeling. BPMDS 2011, EMMSAD 2011. Lecture notes in business information processing, vol 81. Springer, Berlin LuJHuangZKeCVerification of behavior-aware privacy requirements in web services compositionJournal of Software201494944951 ConstanteEPaciFZannoneNPrivacy-aware web service composition and rankingInternational Conference on Web Services2013103131138 Bertino E (2016) Data privacy for IoT systems: concepts, approaches, and research directions. International Conference on Big Data, pp 3645–3647 BhatiaRGujralMSPrivacy aware access control: a literature survey and novel frameworkInternational Journal of Information Technologies and Systems Approach2017102173010.4018/IJITSA.2017070102 OASIS WS-BPEL Technical Committee, Web Services Business Process Execution Language Version 2.0 (2007). http://docs.oasis-open.org/wsbpel/2.0/OS/wsbpel-v2.0-OS.html Focardi R, Gorrieri R, Lanotte R et al (2002) Formal models of timing attacks on web privacy. Electronic Notes in Theoretical Computer Science, pp 229–243 Joshaghani R, Black S, Sherman E et al (2019) Formal specification and verification of user-centric privacy policies for ubiquitous systems. International Database Engineering and Applications Symposium 1846_CR8 1846_CR7 G Honghao (1846_CR19) 2013; 7 J Jangjaccard (1846_CR3) 2014; 80 1846_CR5 J LeeI (1846_CR2) 2015; 58 H Gao (1846_CR20) 2017; 27 1846_CR29 1846_CR28 1846_CR26 H Gao (1846_CR31) 2018; 28 1846_CR24 1846_CR23 1846_CR22 1846_CR1 R Roman (1846_CR6) 2011; 44 IE Chama (1846_CR30) 2017; 8 E Constante (1846_CR4) 2013; 10 J Lu (1846_CR25) 2014; 9 cr-split#-1846_CR27.2 cr-split#-1846_CR27.1 H Gao (1846_CR21) 2019; 20 1846_CR18 1846_CR17 1846_CR16 1846_CR15 RH Weber (1846_CR9) 2010; 26 R Bhatia (1846_CR10) 2017; 10 1846_CR14 1846_CR13 1846_CR12 1846_CR11 |
| References_xml | – reference: Song D, Wagner D, Tian X et al (2001) Timing analysis of keystrokes and timing attacks on SSH. Usenix Security Symposium, pp 25–25 – reference: ConstanteEPaciFZannoneNPrivacy-aware web service composition and rankingInternational Conference on Web Services2013103131138 – reference: UPPALL (2019) UPPAAL web help. https://www.it.uu.se/research/group/darts/uppaal/help.php?file=WebHelp – reference: WeberRHInternet of things: new security and privacy challengesThe Internet of Things2010261233010.1007/978-3-642-11710-7_2 – reference: Bertino E (2016) Data privacy for IoT systems: concepts, approaches, and research directions. International Conference on Big Data, pp 3645–3647 – reference: BhatiaRGujralMSPrivacy aware access control: a literature survey and novel frameworkInternational Journal of Information Technologies and Systems Approach2017102173010.4018/IJITSA.2017070102 – reference: RomanRNajeraPLopezJSecuring the internet of thingsIEEE Computer2011449515810.1109/MC.2011.291 – reference: Li YH, Paik H, Benatallah B et al (2006) Formal consistency verification between BPEL process and privacy policy. Conference on Privacy, Security and Trust – reference: Felten EW, Schneider MA (2000) Timing attacks on Web privacy. Computer and Communications Security, pp 25–32 – reference: Joshaghani R, Black S, Sherman E et al (2019) Formal specification and verification of user-centric privacy policies for ubiquitous systems. International Database Engineering and Applications Symposium – reference: Liu L, Huang Z, Xiao F et al (2010) Verification of privacy requirements in web services composition. International Symposium on Data, Privacy, and E-Commerce, pp 117–122 – reference: Labda W, Mehandjiev N, Sampaio P et al (2014) Modeling of privacy-aware business processes in BPMN to protect personal data. ACM Symposium on Applied Computing, pp 1399–1405 – reference: OASIS WS-BPEL Technical Committee, Web Services Business Process Execution Language Version 2.0 (2007). http://docs.oasis-open.org/wsbpel/2.0/OS/wsbpel-v2.0-OS.html – reference: Lemoine F, Aubonnet t, Simoni N (2020) IoT composition based on self-controlled services. Journal of Ambient Intelligence and Humanized Computing 11: 5167–5186 – reference: Alur R, Courcoubetis C, Dill D (1990) Model-checking for real-time systems. Proceedings. Fifth Annual IEEE Symposium on Logic in Computer Science, Philadelphia, PA, USA, pp 414– 425 – reference: Fares E, Bodeveix JP, Filali M et al (2011) Verification of timed BPEL 2.0 models. In: Halpin T (ed) Enterprise, business-process and information systems modeling. BPMDS 2011, EMMSAD 2011. Lecture notes in business information processing, vol 81. Springer, Berlin – reference: JangjaccardJNepalSA survey of emerging threats in cybersecurityJ Comput Syst Sci2014805973993318330110.1016/j.jcss.2014.02.005 – reference: LeeIJLeeKThe Internet of Things (IoT): applications, investments, and challenges for enterprisesBusiness Horizons201558443144010.1016/j.bushor.2015.03.008 – reference: Focardi R, Gorrieri R, Lanotte R et al (2002) Formal models of timing attacks on web privacy. Electronic Notes in Theoretical Computer Science, pp 229–243 – reference: GaoHMiaoHLiuLAutomated quantitative verification for service-based system design: a visualization transform tool perspectiveInternational Journal of Software Engineering and Knowledge Engineering201828101369139710.1142/S0218194018500390 – reference: Erl T (2008) SOA Principles of Service Design (Prentice Hall) – reference: HonghaoGHuaikouMHongweiZPredictive web service monitoring using probabilistic model checkingApplied Mathematics & Information Sciences201371L139148299849410.12785/amis/071L20 – reference: Butun I (2017) Privacy and trust relations in Internet of Things from the user point of view. IEEE Annual Computing and Communication Workshop and Conference, pp 1–5 – reference: LuJHuangZKeCVerification of behavior-aware privacy requirements in web services compositionJournal of Software201494944951 – reference: Song W, Ma X, Ye C et al (2009) Timed modeling and verification of BPEL processes using time petri nets. International Conference on Quality Software, pp 92–97 – reference: GaoHChuDDuanYThe probabilistic model checking based service selection method for business process modelingJournal of Software Engineering and Knowledge Engineering201727689792310.1142/S0218194017500334 – reference: Mateescu R, Rampacek S (2008) Formal modeling and discrete-time analysis of BPEL web services. In: Dietzj LG, Albani A, Barjis J (eds) Advances in enterprise engineering i. CIAO! 2008, EOMAS 2008. Lecture notes in business information processing, vol 10. Springer, Berlin – reference: Chama IE, Belala N, Saidouni DE et al (2014) Formalization and analysis of timed BPEL. Information Reuse and Integration, pp 483–491 – reference: David A, Larsen KG, Legay A et al (2010) Timed I/O automata: a complete specification theory for real-time systems. ACM International Conference Hybrid Systems Computation and Control, pp 91–100 – reference: ChamaIEBelalaNSaidouniDEA timed semantics for web services compositionInternational Journal of Business Process Integration and Management201781647910.1504/IJBPIM.2017.082765 – reference: GaoHHuangWDuanYYangXZouQResearch on cost-driven services composition in an uncertain environmentJournal of Internet Technology (JIT)2019203755769 – ident: 1846_CR13 – ident: 1846_CR16 doi: 10.1109/LICS.1990.113766 – ident: 1846_CR8 doi: 10.1109/CCWC.2017.7868419 – ident: 1846_CR1 doi: 10.1007/s12652-020-01831-4 – volume: 26 start-page: 23 issue: 1 year: 2010 ident: 1846_CR9 publication-title: The Internet of Things doi: 10.1007/978-3-642-11710-7_2 – volume: 44 start-page: 51 issue: 9 year: 2011 ident: 1846_CR6 publication-title: IEEE Computer doi: 10.1109/MC.2011.291 – volume: 10 start-page: 17 issue: 2 year: 2017 ident: 1846_CR10 publication-title: International Journal of Information Technologies and Systems Approach doi: 10.4018/IJITSA.2017070102 – ident: #cr-split#-1846_CR27.2 – ident: 1846_CR28 doi: 10.1109/QSIC.2009.20 – ident: 1846_CR24 doi: 10.1109/ISDPE.2010.25 – ident: #cr-split#-1846_CR27.1 doi: 10.1007/978-3-642-21759-3_19 – ident: 1846_CR7 doi: 10.1109/BigData.2016.7841030 – ident: 1846_CR17 doi: 10.1016/S1571-0661(04)00329-9 – ident: 1846_CR29 doi: 10.1109/IRI.2014.7051928 – volume: 8 start-page: 64 issue: 1 year: 2017 ident: 1846_CR30 publication-title: International Journal of Business Process Integration and Management doi: 10.1504/IJBPIM.2017.082765 – ident: 1846_CR11 – volume: 27 start-page: 897 issue: 6 year: 2017 ident: 1846_CR20 publication-title: Journal of Software Engineering and Knowledge Engineering doi: 10.1142/S0218194017500334 – ident: 1846_CR12 – volume: 58 start-page: 431 issue: 4 year: 2015 ident: 1846_CR2 publication-title: Business Horizons doi: 10.1016/j.bushor.2015.03.008 – volume: 9 start-page: 944 issue: 4 year: 2014 ident: 1846_CR25 publication-title: Journal of Software – volume: 28 start-page: 1369 issue: 10 year: 2018 ident: 1846_CR31 publication-title: International Journal of Software Engineering and Knowledge Engineering doi: 10.1142/S0218194018500390 – ident: 1846_CR23 doi: 10.1145/1501434.1501466 – ident: 1846_CR22 doi: 10.1145/3331076.3331105 – ident: 1846_CR14 doi: 10.1145/1755952.1755967 – volume: 7 start-page: 139 issue: 1L year: 2013 ident: 1846_CR19 publication-title: Applied Mathematics & Information Sciences doi: 10.12785/amis/071L20 – volume: 10 start-page: 131 issue: 3 year: 2013 ident: 1846_CR4 publication-title: International Conference on Web Services – volume: 80 start-page: 973 issue: 5 year: 2014 ident: 1846_CR3 publication-title: J Comput Syst Sci doi: 10.1016/j.jcss.2014.02.005 – ident: 1846_CR26 doi: 10.1007/978-3-540-68644-6_13 – ident: 1846_CR15 doi: 10.1145/352600.352606 – ident: 1846_CR5 doi: 10.1145/2554850.2555014 – ident: 1846_CR18 – volume: 20 start-page: 755 issue: 3 year: 2019 ident: 1846_CR21 publication-title: Journal of Internet Technology (JIT) |
| SSID | ssj0005584 |
| Score | 2.5153284 |
| Snippet | With the development of the Internet of Things (IoT) and the Internet, new kinds of services based on IoT devices will benefit everyone. As a key step in... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 2272 |
| SubjectTerms | Algorithms Business Process Execution Language Communications Engineering Composition effects Computer Communication Networks Electrical Engineering Engineering Internet of Things IT in Business Networks Privacy Verification |
| SummonAdditionalLinks | – databaseName: Springer Journals New Starts & Take-Overs Collection dbid: RSV link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dS8MwEA8yfdAHv8XplHvwTQv9WNt0b_MLB2MWrbK3kiYpCLLKVof-Pf6jXrLUTlFB3wq9pCW55H6X3O-OkKM8524kfWpldi6sNsttKwvwiapbQSEi4ej6Kff9cDCgw2EUG1LYpIp2r64k9U5dk90clTxXhRTY6JYEFiLHRTR3VBVsuLm9rwM7fDorZUs9C52_oaHKfN_HZ3NUY8wv16La2lyu_e8_18mqQZfQnanDBlmQo02yMpdzcIu83Z4nvetuB1QVNMVFB4SAoJggAuLxw5TxV7iRKj5YHxxOoMihVyRgNhVQG4gJ9OpAF-5QhUEfK84YEhDX7E1AQAzd57LQaWEhmcPIKKiILXAaX_ShLMz3jSzbJsnlRXJ2ZZlKDRbHJVxavszaCHzDjHrtSAQ0DxiXPPNtJ6MhY1ylNZNBblOONhmVRnquiBD8uDn6KzLydkhjVIzkLgHtwIgotCOXtblLM8qYE2aeQD9RSIc2iVPNV8pNFnNVTOMxrfMvq_FPcfxTPf7pS5Mcf7R5muXw-FW6ValBatbzJHUDNOMK3QZNclJNe_365972_ia-T5ZdpTk6XqZFGuX4WR6QJT4tHybjQ63n7zyj-kE priority: 102 providerName: Springer Nature |
| Title | SDTIOA: Modeling the Timed Privacy Requirements of IoT Service Composition: A User Interaction Perspective for Automatic Transformation from BPEL to Timed Automata |
| URI | https://link.springer.com/article/10.1007/s11036-021-01846-x https://www.proquest.com/docview/2628405406 |
| Volume | 26 |
| WOSCitedRecordID | wos000716371500008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: SpringerLink Core Collection customDbUrl: eissn: 1572-8153 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0005584 issn: 1383-469X databaseCode: RSV dateStart: 19970101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lb9QwEB7RlgMceCMWymoO3MAij03i9IK2ZSsqyhJtQ1m4RIntSJWqTbubVuX38EeZcbykINELFytRHCfSjMffvAFe1bUKUhNJUXm1FqOy9kQV05Vkr6DWqfZt_5Tjw2Q6lfN5mjmD28qFVa5lohXUulFsI38bxCRIGV_E787OBXeNYu-qa6GxAVuMbDik75O314d4RLJraitDQWrg3CXNdKlzPpfi5QAFj5ScWFz9eTD1aPMvB6k9d_bv_-8fP4B7DnHiuGORh3DLLB7B3Wt1CB_Dz6P3-cHn8Q5yZzTOT0eChcjZIRqz5cllqX7gzHDMsDUmrrCp8aDJ0QkaZKHigr92cIxfiK3Rmhq7rAnM-oxOJJCM44u2saViMb-Gm2kiJ7vgbjY5xLZx33dzyyeQ70_yvQ_CdW8QirZ1KyJTjQgMJ5UMR6mOZR2Xyqgq8vxKJmWpuNSZiWtPKjqniZFMGOiUAFFQkw5j0vApbC6ahXkGaJUanSZeGpQjFchKlqWfVKEm3VEbXw7AX1OuUK6yOTfYOC36msxM7YKoXVhqF1cDeP37nbOurseNs7fXJC7cHl8VPX0H8GbNJP3jf6_2_ObVXsCdgPnSxsxsw2a7vDAv4ba6bE9WyyFsJF-_DWFrdzLNZnT3MRFDy_U0ZtF3GmdHx78AfZUI9g |
| linkProvider | ProQuest |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwELaqggQceFcsFJgDnMAicbKJUwmhhbbqapdlBQHtzXJsR6qENmU3Le3v4cx_ZMZJSEGitx64RYrjKM43L3u-GcaelaURmRtKXgSl5bEuA14keCXpVNDazIa-f8qXaTqbycUim2-wnx0XhtIqO53oFbWtDO2RvxIJKlLyL5I3R984dY2i09WuhUYDi4k7-44h2_r1eBf_73Mh9vfydwe87SrADcKt5kNXxOikpYWM4swmsky0caYYBmEhU60NleBySRlIg_YDP9BFwmZoqEWJvrWj2kuo8a_EkUxJrCYp7zNKhrLpoSsjjlHnouXoNEy9kCr_Uj5EgDFVwk__tIO9c_vXeaw3c_u3_rMFus1utv40jBoBuMM23PIuu3GuyuI99uPTbj7-MNoB6vtG7HtApxeI-2Jhvjo80eYMPjrKiPZbpWuoShhXObRqFEhltqltOzCCzyi04DdSG04IzHu-KmAIAKPjuvKFcCE_FxXgQKLywNv53hTqqn1_O1bfZ_llLNIW21xWS_eAgQ_ZbJYGmdCxEbKQWodpEVmMjK0L5YCFHVCUaeu2U_uQr6qvOE3gUggu5cGlTgfsxe9njpqqJReO3u4QpVoNtlY9nAbsZYfJ_va_Z3t48WxP2bWD_P1UTcezySN2XZBI-OygbbZZr47dY3bVnNSH69UTL1zA1CVj9Rd4V2Ht |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V3NbtQwELaqghAcKL9iSwtzgBNETbybxKlUoS3bFauulggCWvUSObYjVUKbdjct7fPwFLwdM45DChK99cAtkp1Ecb75s-ebYexVWSqemFB4hV9qbyBL3ysivBJ0Kqh1ogPbP-XrNJ7NxHyepGvsZ8uFobTKVidaRa0rRXvkOzxCRUr-RbRTurSIdDR-d3LqUQcpOmlt22k0EDk0l98xfFvtTUb4r19zPj7I3n_wXIcBTyH0ai80xQAdtrgQ_UGiI1FGUhlVhH5QiFhKReW4TFT6QqEtwY81fa4TNNq8RD_bUB0m1P63YgwxKZswDY-67JJQNP10Rd_D4bnj6zSsvYCqAFNuhI_xVeRd_GkTO0f3r7NZa_LGG__xYj1g952fDcNGMB6yNbN4xO5dqb74mP34PMomH4e7QP3giJUP6AwDcWI0pMvjc6ku4ZOhTGm7hbqCqoRJlYFTr0Cq1KW87cIQvqAwg91gbbgikHY8VsDQAIZndWUL5EJ2JVrAiUTxgf30YAp15d7v5sonLLuJRXrK1hfVwjxjYEM5ncR-wuVAcVEIKYO46GuMmLUJRI8FLWhy5eq5U1uRb3lXiZqAliPQcgu0_KLH3vy-56SpZnLt7K0WXbnTbKu8g1aPvW3x2Q3_-2mb1z_tJbuDEM2nk9nhc3aXk3TYpKEttl4vz8w2u63O6-PV8oWVM2D5DUP1F8hVaxE |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=SDTIOA%3A+Modeling+the+Timed+Privacy+Requirements+of+IoT+Service+Composition%3A+A+User+Interaction+Perspective+for+Automatic+Transformation+from+BPEL+to+Timed+Automata&rft.jtitle=Mobile+networks+and+applications&rft.au=Gao%2C+Honghao&rft.au=Zhang%2C+Yida&rft.au=Miao%2C+Huaikou&rft.au=Barroso%2C+Ram%C3%B3n+J.+Dur%C3%A1n&rft.date=2021-12-01&rft.issn=1383-469X&rft.eissn=1572-8153&rft.volume=26&rft.issue=6&rft.spage=2272&rft.epage=2297&rft_id=info:doi/10.1007%2Fs11036-021-01846-x&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s11036_021_01846_x |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1383-469X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1383-469X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1383-469X&client=summon |