Sciweavers

MDM
2007
Springer
123views Communications» more  MDM 2007»
13 years 11 months ago
Hiding Location Information from Location-Based Services
—In many existing location-based services, a service provider becomes aware of the location of its customers and can, maybe inadvertently, leak this information to unauthorized e...
Urs Hengartner
ICSOC
2007
Springer
13 years 11 months ago
Dynamic Service Provisioning Using GRIA SLAs
Service Level Agreements (SLA) include quality of service (QoS) constraints and bounds that have to be honoured by the service provider. To maximise the Service Provider revenue wh...
Mike J. Boniface, Stephen C. Phillips, Alfonso S&a...
GECCO
2007
Springer
183views Optimization» more  GECCO 2007»
13 years 11 months ago
Search-based testing of service level agreements
The diffusion of service oriented architectures introduces the need for novel testing approaches. On the one side, testing must be able to identify failures in the functionality ...
Massimiliano Di Penta, Gerardo Canfora, Gianpiero ...
ESORICS
2007
Springer
13 years 11 months ago
Encryption Techniques for Secure Database Outsourcing
Abstract. While the idea of database outsourcing is becoming increasingly popular, the associated security risks still prevent many potential users from deploying it. In particular...
Sergei Evdokimov, Oliver Günther
IEEEARES
2007
IEEE
13 years 11 months ago
Effects of Architectural Decisions in Authentication and Authorisation Infrastructures
AAIs – Infrastructures for Authentication and Authorisation provide services for service providers on the Internet. Especially if combined with an attribute infrastructure these...
Christian Schläger, Monika Ganslmayer
ICEBE
2007
IEEE
158views Business» more  ICEBE 2007»
13 years 11 months ago
The Design of A Rule-based and Event-driven Trust Management Framework
In both E-Commerce (EC) and Service-Oriented Computing (SOC) environments, sellers or service providers interact with customers or service clients for services or transactions. Fr...
Yan Wang 0002, Duncan S. Wong, Kwei-Jay Lin, Vijay...
ICDE
2007
IEEE
111views Database» more  ICDE 2007»
13 years 11 months ago
Efficient Deployment of Web Service Workflows
The appropriate deployment of web service operations at the service provider site plays a critical role in the efficient provision of services to clients. In this paper, we assume...
Konstantinos Stamkopoulos, Evaggelia Pitoura, Pano...
WECWIS
2008
IEEE
104views ECommerce» more  WECWIS 2008»
13 years 11 months ago
WSDL-D: A Flexible Web Service Invocation Mechanism for Large Datasets
WSDL web services are built around the request-reply framework, requiring service invocation to be bundled together with all relevant data in a single message. Inefficiency become...
Mark Wiley, Aihua Wu 0002, Jianwen Su
IPPS
2008
IEEE
13 years 11 months ago
SLA-based resource allocation in cluster computing systems
Resource allocation is a fundamental but challenging problem due to the complexity of cluster computing systems. In enterprise service computing, resource allocation is often asso...
Kaiqi Xiong, Harry G. Perros
IEEESCC
2008
IEEE
13 years 11 months ago
Using Semantics for Resource Allocation in Computing Service Providers
Service providers (SP) business goals require an efficient management of their computational resources in order to perform provisioning, deployment, execution and adaptation whic...
Jorge Ejarque, Marc de Palol, Iñigo Goiri, ...