Research Article
Distributed Secure Service Composition with Declassification in Mobile Clouds
Algorithm 2
Adjacent Verify & Declass(⋅).
Input: | Output: True or False | () for each do | (2) if Verification== False then | () | () end if | () end for | () if Key_ Negotiation== False then | () return False | () end if | () Compute Out Required | () for each do | () if Verification()== False then | () | () end if | () end for | () if Key_ Negotiation== False then | () return False | () end if | () return True |
|