Sciweavers

343 search results - page 3 / 69
» Isolation Support for Service-based Applications: A Position...
Sort
View
ACSAC
1998
IEEE
13 years 10 months ago
Application-Level Isolation to Cope with Malicious Database Users
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...
Sushil Jajodia, Peng Liu, Catherine D. McCollum
ACMICEC
2006
ACM
159views ECommerce» more  ACMICEC 2006»
13 years 11 months ago
Choreography of web services based on natural language storybooks
Business processes usually span beyond the boundaries of single operations and many a process spans even beyond the boundaries of organizations. Web Service orchestration or chore...
Kurt Englmeier, Javier Pereira, Josiane Mothe
COMPSAC
2006
IEEE
13 years 12 months ago
Automated Agent Synthesis for Situation Awareness in Service-Based Systems
Service-based systems have many applications, such as collaborative research and development, e-business, health care, military applications, and homeland security. In dynamic ser...
Stephen S. Yau, Haishan Gong, Dazhi Huang, Wei Gao...
GI
2000
Springer
13 years 9 months ago
Taming the Tiger: How to Cope with Real Database Products in Transactional Federations for Internet Applications
Data consistency in transactional federations is a key requirement of advanced E-service applications on the Internet, such as electronic auctions or real-estate purchase. Federat...
Ralf Schenkel, Gerhard Weikum
ICSOC
2003
Springer
13 years 11 months ago
Service-Based Distributed Querying on the Grid
Service-based approaches (such as Web Services and the Open Grid Services Architecture) have gained considerable attention recently for supporting distributed application developme...
M. Nedim Alpdemir, Arijit Mukherjee, Norman W. Pat...