In this paper we describe our experience in applying KAoS services to ensure policy compliance for Semantic Web Services workflow composition and enactment. We are developing thes...
Andrzej Uszok, Jeffrey M. Bradshaw, Renia Jeffers,...
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against...
Grid computing is becoming an important framework for enabling applications to utilize widely distributed collections of computational and data resources, however current grid sof...
Paul D. Coddington, Lici Lu, Darren Webb, Andrew L...
A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been shown by Heather et al. that there are simple formatting conv...
More than a process-automating tool, telemedicine is increasingly recognized for its ability to facilitate collaboration and knowledge creation between disparate healthcare provid...
Houghton G. Brown, Marshall Scott Poole, Thomas Le...