Keyphrases
Off-blockchain
100%
Electronic Contract
100%
Smart Contract
100%
Unikernel
100%
Contract Monitoring
55%
Contract Compliance
46%
Hybrid Architecture
41%
Service Agreements
41%
Model Checker
40%
Monitoring Service
38%
Blockchain
38%
Cloud Infrastructure
37%
Capability-Based Access Control (CapBAC)
34%
Cloud-based
34%
High-level Model
33%
Dynamic Deployment
33%
State-aware
33%
Internet of Things
33%
Service Level Agreement
33%
Software Guard Extensions
33%
Dynamic Testing
33%
Large Classes
30%
Checkers
30%
Dynamic Nature
28%
Hybrid Solutions
25%
Electronic Interaction
23%
Trusted Third Party
22%
Linear Temporal Logic
22%
Virtual Machine
17%
Web-based
17%
Automated Support
16%
Business Rules
16%
Compliance Enforcement
16%
Contract Clauses
16%
Message Middleware
16%
Internet of Cloud
16%
Compliance Checking
16%
Community Cloud
16%
Performance Scalability
16%
Performance Consistency
16%
Service Interactions
16%
Consistency Condition
16%
Contract Enforcement
16%
Centralized Approach
16%
Business Relationships
16%
Expressiveness
16%
Cloud of Things
16%
Performance Requirements
16%
Decentralization
16%
Cost Issue
16%
Computer Science
Blockchain
100%
Smart Contract
100%
model checker
66%
Service Agreement
66%
Hypervisor
66%
Virtual Machine
66%
Compliance Checker
55%
Access Control Policies
50%
Cloud Infrastructure
50%
Protection Mechanism
44%
Monitoring Service
41%
Hybrid Architecture
41%
Dynamic Nature
41%
Access Control
38%
Linear Temporal Logic
33%
Execution Environments
33%
Security Module
33%
Attack Surface
33%
Internet-Of-Things
33%
Malicious Insider
27%
Execution Sequence
25%
Business Partner
25%
Cloud Computing
22%
Quality of Service
19%
Security Architecture
16%
Involved Entity
16%
Hybrid Solution
16%
Operating System Layer
16%
Service-Level Agreement
16%
Performance Evaluation
16%
Operating Systems
16%
Response Time
16%
Service Interaction
16%
Ethereum
13%
Mandatory Access Control
11%
Principle of Least Privilege
11%
Security Policy
11%
High-Level Language
8%
e-Services
8%
Centralized Approach
8%
Hybrid Application
5%
Context Switching
5%
Exfiltrate Data
5%
Virtualization Software
5%
Security Incident
5%
Misconfiguration
5%
Privilege Escalation
5%
Software Layer
5%
Physical Attack
5%
Cloud Service Provider
5%