Skip to main content

and
  1. No Access

    Article

    Preserving privacy information flow security in composite service evolution

    After a composite service is deployed, user privacy requirements and trust levels of component services are subject to variation. When the changes occur, it is critical to preserve privacy information flow sec...

    Huan-feng Peng, Zhi-qiu Huang, Lin-yuan Liu in Frontiers of Information Technology & Elec… (2018)