Sciweavers

248 search results - page 30 / 50
» Enforcing Secure Service Composition
Sort
View
IJISEC
2002
52views more  IJISEC 2002»
14 years 9 months ago
Securing SOAP e-services
Remote service invocation via HTTP and XML promises to become an important component of the Internet infrastructure. Work is ongoing in the W3C XML Protocol Working Group to define...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
80
Voted
CSFW
2008
IEEE
15 years 4 months ago
Composition of Password-Based Protocols
We investigate the composition of protocols that share a common secret. This situation arises when users employ the same password on different services. More precisely we study w...
Stéphanie Delaune, Steve Kremer, Mark Ryan
SOSE
2006
IEEE
15 years 3 months ago
Service Engineering Design Patterns
Design of service-oriented applications differs from design of the component-based applications in granularity, abstraction and dynamic environment in which binding between client...
Nikola Milanovic
TON
2002
102views more  TON 2002»
14 years 9 months ago
A min, + system theory for constrained traffic regulation and dynamic service guarantees
By extending the system theory under the (min, +) algebra to the time-varying setting, we solve the problem of constrained traffic regulation and develop a calculus for dynamic ser...
Cheng-Shang Chang, Rene L. Cruz, Jean-Yves Le Boud...
ICWS
2008
IEEE
14 years 11 months ago
A QoS-Oriented Reconfigurable Middleware for Self-Healing Web Services
Maintaining the Quality of Service (QoS) is important for self-healing web service-based distributed interactive applications. It requires the ability to deal with permanently cha...
Riadh Ben Halima, Khalil Drira, Mohamed Jmaiel