Sciweavers

248 search results - page 15 / 50
» Enforcing Secure Service Composition
Sort
View
ICSOC
2009
Springer
14 years 7 months ago
A Genetic Algorithms-Based Approach for Optimized Self-protection in a Pervasive Service Middleware
With increasingly complex and heterogeneous systems in pervasive service computing, it becomes more and more important to provide self-protected services to end users. In order to ...
Weishan Zhang, Julian Schütte, Mads Ingstrup,...
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
14 years 6 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
TRUSTBUS
2007
Springer
15 years 3 months ago
Securing VO Management
Abstract. In this paper we propose a security architecture and mechanism for Virtual Organizations (VO) for businesses. The VOs we consider are based on web service technology to a...
Florian Kerschbaum, Rafael Deitos, Philip Robinson
ECOWS
2009
Springer
15 years 4 months ago
Specifying and Monitoring Temporal Properties in Web Services Compositions
—Current Web service composition approaches and languages such as WS-BPEL do not allow to define temporal constraints in a declarative and separate way. Also it is not possible ...
Slim Kallel, Anis Charfi, Tom Dinkelaker, Mira Mez...
ENASE
2009
131views Hardware» more  ENASE 2009»
14 years 7 months ago
Flexible Composites and Automatic Component Selection for Service-Based Applications
In traditional Software Engineering approaches, an application is described as a composite entity containing all its components. This approach is no longer relevant in modern Softw...
Jacky Estublier, Idrissa A. Dieng, Eric Simon, Ger...