Sciweavers

24 search results - page 1 / 5
» Transparently Adding Security Properties to Service Orchestr...
Sort
View
AINA
2008
IEEE
13 years 11 months ago
Transparently Adding Security Properties to Service Orchestration
In this paper, we present a tool allowing the design of orchestration at a high level of abstraction. This tool also allows specifying security properties, also in an way, as anno...
Stéphanie Chollet, Philippe Lalanda, Andr&e...
FOSAD
2007
Springer
13 years 10 months ago
Secure Service Orchestration
Abstract. We present a framework for designing and composing services in a secure manner. Services can enforce security policies locally, and can invoke other services in a “call...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
SUTC
2006
IEEE
13 years 10 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
ICAC
2008
IEEE
13 years 11 months ago
Runtime Fault-Handling for Job-Flow Management in Grid Environments
The execution of job flow applications is a reality today in academic and industrial domains. In this paper, we propose an approach to adding self-healing behavior to the executio...
Gargi Dasgupta, Onyeka Ezenwoye, Liana Fong, Selim...
WWW
2005
ACM
14 years 5 months ago
Middleware services for web service compositions
WS-* specifications cover a variety of issues ranging from security and reliability to transaction support in web services. However, these specifications do not address web servic...
Anis Charfi, Mira Mezini