Research Article

Distributed Secure Service Composition with Declassification in Mobile Clouds

Table 1

Basic comparison.

ApproachFrameworkInformation
declassifying

Hutter and Volkamer [9]Type systemCentralized×
Nakajima [12]Model checkingCentralized
She et al. [1315]Program analysisCentralized×
Chou [19]Program analysisDistributed×
Solanki et al. [20]Program analysisDistributed×
Xi et al. [21]Model checkingDistributed×
Xi et al. [16]Program analysisDistributed×
This paperProgram analysisDistributed