Academic literature on the topic 'Trustworthy service management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Trustworthy service management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Trustworthy service management"
Luo, Zongwei, and Tianle Zhang. "A Mobile Service Platform for Trustworthy E-Learning Service Provisioning." International Journal of Dependable and Trustworthy Information Systems 1, no. 3 (July 2010): 1–13. http://dx.doi.org/10.4018/jdtis.2010070101.
Full textFarahbakhsh, Bahareh, Ali Fanian, and Mohammad Hossein Manshaei. "TGSM: Towards trustworthy group-based service management for social IoT." Internet of Things 13 (March 2021): 100312. http://dx.doi.org/10.1016/j.iot.2020.100312.
Full textKurdi, Heba, Bushra Alshayban, Lina Altoaimy, and Shada Alsalamah. "TrustyFeer: A Subjective Logic Trust Model for Smart City Peer-to-Peer Federated Clouds." Wireless Communications and Mobile Computing 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/1073216.
Full textPerepelkin, Jason, and David Di Zhang. "Quality alone is not enough to be trustworthy." International Journal of Pharmaceutical and Healthcare Marketing 8, no. 2 (May 27, 2014): 226–42. http://dx.doi.org/10.1108/ijphm-02-2013-0006.
Full textMoustafa, Ahmed, Minjie Zhang, and Quan Bai. "Trustworthy Stigmergic Service Compositionand Adaptation in Decentralized Environments." IEEE Transactions on Services Computing 9, no. 2 (March 2016): 317–29. http://dx.doi.org/10.1109/tsc.2014.2298873.
Full textBhatia, Sugandh, and Jyoteesh Malhotra. "CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Framework." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (October 1, 2018): 3756. http://dx.doi.org/10.11591/ijece.v8i5.pp3756-3766.
Full textHWANG, JUNSEOK, SO YOUNG KIM, HAK-JIN KIM, and JIHYOUN PARK. "AN OPTIMAL TRUST MANAGEMENT METHOD TO PROTECT PRIVACY AND STRENGTHEN OBJECTIVITY IN UTILITY COMPUTING SERVICES." International Journal of Information Technology & Decision Making 10, no. 02 (March 2011): 287–308. http://dx.doi.org/10.1142/s0219622011004336.
Full textAbdullah, Lamya, and Juan Quintero. "Sealed computation: a mechanism to support privacy-aware trustworthy cloud service." Information & Computer Security 27, no. 5 (November 11, 2019): 601–20. http://dx.doi.org/10.1108/ics-11-2018-0133.
Full textRobles, Tomás, Borja Bordel, Ramón Alcarria, and Diego Sánchez-de-Rivera. "Enabling trustworthy personal data protection in eHealth and well-being services through privacy-by-design." International Journal of Distributed Sensor Networks 16, no. 5 (May 2020): 155014772091211. http://dx.doi.org/10.1177/1550147720912110.
Full textAlam, Masoom, Mohammad Nauman, Xinwen Zhang, Tamleek Ali, Patrick C. K. Hung, and Quratulain Alam. "Behavioral Attestation for Web Services Based Business Processes." International Journal of Web Services Research 7, no. 3 (July 2010): 52–72. http://dx.doi.org/10.4018/jwsr.2010070103.
Full textBooks on the topic "Trustworthy service management"
Dalpiaz, Fabiano, Achim Brucker, Paolo Giorgini, Per Håkon Meland, and Erkuden Rios. Secure and Trustworthy Service Composition: The Aniketos Approach. Springer, 2014.
Find full textDalpiaz, Fabiano, Achim Brucker, Paolo Giorgini, Per Håkon Meland, and Erkuden Rios. Secure and Trustworthy Service Composition: The Aniketos Approach. Springer London, Limited, 2014.
Find full textLeontyeva, Anna A., and Ksenia V. Melchakova, eds. A Stranger’s Gaze: Diplomats, Journalists, Scholars — Travellers between East and West from the Eighteenth Century to the Twenty-First. Institute of Slavic Studies, Russian Academy of Sciences; Nestor-Istoriia, 2020. http://dx.doi.org/10.31168/4469-1767-9.
Full textBook chapters on the topic "Trustworthy service management"
Yuan, Yuyu, Yangyang Zhang, and Jing Liu. "Service Behavior Trustworthiness Management." In Trustworthy Computing and Services, 20–25. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35795-4_3.
Full textMiandrilala and YuYu Yuan. "Concept of Service Trustworthiness Management System (STMS)." In Trustworthy Computing and Services, 374–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43908-1_46.
Full textPaul, Stéphane, Alessandra Tedeschi, Erlend Andreas Gjære, and Ivonne Herrera. "The Aniketos Design-Time Framework Applied – A Case in Air Traffic Management." In Secure and Trustworthy Service Composition, 203–18. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13518-2_14.
Full textMaciaszek, Leszek A. "An Architectural Style for Trustworthy Adaptive Service Based Applications." In Business System Management and Engineering, 109–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32439-0_7.
Full textSteimers, André, and Thomas Bömer. "Sources of Risk and Design Principles of Trustworthy Artificial Intelligence." In Digital Human Modeling and Applications in Health, Safety, Ergonomics and Risk Management. AI, Product and Service, 239–51. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77820-0_18.
Full textLi, Linghan, Yonghua Li, Jiaru Lin, and Tianle Zhang. "Enhanced AllJoyn Network with Centralized Management." In Trustworthy Computing and Services, 183–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47401-3_24.
Full textQiu, Shaolin, Laibin Zhang, Yuanqiang Huang, and Yaming Mao. "An Effective Resource Management Architecture in HSE System." In Trustworthy Computing and Services, 260–67. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43908-1_33.
Full textGao, Yuan, Yaoxue Zhang, and Yuezhi Zhou. "A Cache Management Strategy for Transparent Computing Storage System." In Trustworthy Computing and Services, 651–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35795-4_82.
Full textXie, Xiaowei, Yu Yang, and Yueming Lu. "A Zones-Based Metadata Management Method for Distributed File System." In Trustworthy Computing and Services, 169–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43908-1_22.
Full textWong, Andrew, Vicky Liu, William Caelli, and Tony Sahama. "An Architecture for Trustworthy Open Data Services." In Trust Management IX, 149–62. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18491-3_11.
Full textConference papers on the topic "Trustworthy service management"
Zao, J. K., K. T. Nguyen, Y. H. Wang, A. C. H. Lin, B. W. Wang, and J. W. S. Liu. "Trustworthy emergency information brokerage service (TIBS)." In DISASTER MANAGEMENT 2013. Southampton, UK: WIT Press, 2013. http://dx.doi.org/10.2495/dman130221.
Full textZhao, Shenghui, Guoxin Wu, Yuemin Li, and Kun Yu. "A Framework for Trustworthy Web Service Management." In 2009 Second International Symposium on Electronic Commerce and Security. IEEE, 2009. http://dx.doi.org/10.1109/isecs.2009.226.
Full textTao, Qian, Huiyou Chang, Yang Yi, and Chunqin Gu. "A trustworthy management approach for cloud services QoS data." In 2010 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE, 2010. http://dx.doi.org/10.1109/icmlc.2010.5580998.
Full textLee, Myungjin, Kyungmin Kim, Sharly Joana Halder, and Wooju Kim. "Framework of Semantic Web Services for Ubiquitous City Management Center." In 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. IEEE, 2010. http://dx.doi.org/10.1109/sutc.2010.21.
Full text"DESIGN AND MAINTENANCE OF TRUSTWORTHY E-SERVICES: INTRODUCING A TRUST MANAGEMENT CYCLE." In 2nd International Conference on Web Information Systems and Technologies. SciTePress - Science and and Technology Publications, 2006. http://dx.doi.org/10.5220/0001256001000105.
Full textAgbaji, Armstrong Lee. "An Empirical Analysis of Artificial Intelligence, Big Data and Analytics Applications in Exploration and Production Operations." In International Petroleum Technology Conference. IPTC, 2021. http://dx.doi.org/10.2523/iptc-21312-ms.
Full text