Sciweavers

611 search results - page 32 / 123
» Security Issues in Service Composition
Sort
View
114
Voted
ICSOC
2009
Springer
14 years 11 months ago
Using Personal Information Management Infrastructures to Facilitate User-Generated Services for Personal Use
Ad-hoc and situational applications for personal use will gain more and more traction in the work support for knowledge workers (KWers). Personal information is a key element in th...
Olaf Grebner
SAC
2009
ACM
15 years 8 months ago
Applying Reo to service coordination in long-running business transactions
Ensuring transactional behavior of business processes and web service compositions is an essential issue in the area of serviceoriented computing. Transactions in this context may ...
Natallia Kokash, Farhad Arbab
CCS
2007
ACM
15 years 8 months ago
Toward measuring network security using attack graphs
In measuring the overall security of a network, a crucial issue is to correctly compose the measure of individual components. Incorrect compositions may lead to misleading results...
Lingyu Wang, Anoop Singhal, Sushil Jajodia
HPDC
2000
IEEE
15 years 6 months ago
Flexible High-Performance Access to Distributed Storage Resources
We describe a software architecture for storage services in computational grid environments. Based upon a lightweight message-passing paradigm, the architecture enables the provis...
Craig J. Patten, Kenneth A. Hawick
SWS
2006
ACM
15 years 7 months ago
A comprehensive security architecture for dynamic, web service based virtual organizations for businesses
In this paper we propose a security architecture for Virtual Organizations for businesses. The Virtual Organizations we consider are based on web service technology to address int...
Rafael Deitos, Florian Kerschbaum, Philip Robinson