Research Article

Distributed Secure Service Composition with Declassification in Mobile Clouds

Algorithm 1

Key Negotiation(⋅).
Input: ,   or
Output: True or False
and  
()   // and represents insecure
input and outputs in
()  if input is then
()   for each input   do
() Negotiate_Requests
() if Key_Computation
     ==  False then
()     //False means two service components
      can’t generate appropriate
       which satisfies
      ,  else it return
    True.
()   return False
()    end if
()   end for
()  else
() for each output do
() Negotiate_Requests
() if Key_Computation
     ==  False then
()  return False
()    end if
()   end for
()  end if
()  return True. and