Sciweavers

819 search results - page 47 / 164
» Security Controls Applied to Web Service Architectures
Sort
View
WAIM
2004
Springer
15 years 3 months ago
Symbolic Agent Negotiation for Semantic Web Service Exploitation
This paper presents an architecture and a methodology for agent-based Web service discovery and automated composition. We assume that Web services are described with declarative sp...
Peep Küngas, Jinghai Rao, Mihhail Matskin
MIDDLEWARE
2007
Springer
15 years 3 months ago
A service-oriented virtual community overlay network for secure external service orchestration
The Service Oriented Architecture (SOA) is used extensively in ubiquitous computing environments. Using external service orchestration, services can be composed into applications....
Shudong Chen, Johan J. Lukkien
SOCA
2007
IEEE
15 years 4 months ago
Creating Web Services From GUI-Based Applications
— Graphical User Interface (GUI) APplications (GAPs) are ubiquitous and provide various services. However, it is difficult to make GAPs exchange information (i.e., interoperate)...
Mark Grechanik, Kevin M. Conroy, Kishore S. Swamin...
IEEESCC
2009
IEEE
15 years 4 months ago
Web Service Substitution Based on Preferences Over Non-functional Attributes
In many applications involving composite Web services, one or more component services may become unavailable. This presents us with the problem of identifying other components tha...
Ganesh Ram Santhanam, Samik Basu, Vasant Honavar
ACSAC
2002
IEEE
15 years 2 months ago
Architectures for Intrusion Tolerant Database Systems
In this paper, we propose four architectures for intrusion-tolerant database systems. While traditional secure database systems rely on prevention controls, an intrusion-tolerant ...
Peng Liu