메뉴 건너뛰기




Volumn 13, Issue 4, 2004, Pages 413-440

Abstracting and enforcing web service protocols

Author keywords

Con ceptural modeling for service abstractions; Conversation protocols; Protocol enforcement; Trust negotiation policies; Web service protocols

Indexed keywords

ABSTRACTING; AUTOMATION; DESIGN; HIGH LEVEL LANGUAGES; LIFE CYCLE; MIDDLEWARE; NETWORK PROTOCOLS; STANDARDS; XML;

EID: 10444222513     PISSN: 02188430     EISSN: None     Source Type: Journal    
DOI: 10.1142/S021884300400105X     Document Type: Article
Times cited : (12)

References (56)
  • 1
    • 0036570564 scopus 로고    scopus 로고
    • E-business process modeling: The next big step
    • May
    • S. Aissi, P. Malu and K. Srinivasan, E-business process modeling: The next big step, IEEE Computer 35(5) (May 2002) 55-62.
    • (2002) IEEE Computer , vol.35 , Issue.5 , pp. 55-62
    • Aissi, S.1    Malu, P.2    Srinivasan, K.3
  • 3
    • 0038654820 scopus 로고    scopus 로고
    • Web service choreography interface (WSCI) 1.0
    • August
    • A. Arkin et al. (eds.), Web Service Choreography Interface (WSCI) 1.0, W3C Note (August 2002), www.w3.org/TR/wsci.
    • (2002) W3C Note
    • Arkin, A.1
  • 5
    • 3543123364 scopus 로고    scopus 로고
    • Web services conversation language (WSCL) 1.0
    • March
    • A. Banerji et al., Web Services Conversation Language (WSCL) 1.0, W3C Note (March 2002), www.w3.org/TR/wscl10.
    • (2002) W3C Note
    • Banerji, A.1
  • 7
    • 0037251267 scopus 로고    scopus 로고
    • The self-serv environment for web services composition
    • January/February
    • B. Benatallah, Q. Sheng and M. Dumas, The self-serv environment for web services composition, IEEE Internet Computing, (January/February 2003) 40-48.
    • (2003) IEEE Internet Computing , pp. 40-48
    • Benatallah, B.1    Sheng, Q.2    Dumas, M.3
  • 8
    • 0742268963 scopus 로고    scopus 로고
    • Web service conversation modeling: A cornerstone for e-business automation
    • January/February
    • B. Benatallah, F. Casati and F. Toumani, Web service conversation modeling: A cornerstone for e-business automation, IEEE Internet Computing 8(1) (January/February 2004) 46-54.
    • (2004) IEEE Internet Computing , vol.8 , Issue.1 , pp. 46-54
    • Benatallah, B.1    Casati, F.2    Toumani, F.3
  • 9
    • 35248900479 scopus 로고    scopus 로고
    • Automatic composition of e-services that export their behavior
    • Trento, Italy, ser. eds. M. E. Orlowska, et al., Lecture Notes in Computer Science, (Springer, December)
    • D. Berardi et al., Automatic composition of e-services that export their behavior, in ICSOC'03, Trento, Italy, ser. eds. M. E. Orlowska, et al., Lecture Notes in Computer Science, Vol. 2910 (Springer, December 2003), pp. 43-58.
    • (2003) ICSOC'03 , vol.2910 , pp. 43-58
    • Berardi, D.1
  • 13
    • 1142309815 scopus 로고    scopus 로고
    • Provisions and obligations in policy management and security applications
    • Morgan Kaufmann, San Francisco, August
    • C. Bettini et al., Provisions and obligations in policy management and security applications, in Proc. 28th Conf. Very Large Data Bases (VLDB'02) (Morgan Kaufmann, San Francisco, August 2002).
    • (2002) Proc. 28th Conf. Very Large Data Bases (VLDB'02)
    • Bettini, C.1
  • 14
    • 0013142893 scopus 로고    scopus 로고
    • The keynote trust-management system
    • September
    • M. Blaze et al., The KeyNote Trust-Management System, IETF RFC 2704 (September 1999), www.rfc-editor.org/rfc/rfc2704.txt.
    • (1999) IETF RFC , vol.2704
    • Blaze, M.1
  • 16
    • 0036311802 scopus 로고    scopus 로고
    • A unified framework for regulating access and information release on the web
    • P. Bonatti and P. Samarati, A unified framework for regulating access and information release on the web, J. Computer Security 10(3) (2002) 241-272.
    • (2002) J. Computer Security , vol.10 , Issue.3 , pp. 241-272
    • Bonatti, P.1    Samarati, P.2
  • 17
    • 84880478628 scopus 로고    scopus 로고
    • Conversation specification: A new approach to design and analysis of e-service composition
    • ACM Press, 20-24 May
    • T. Bultan et al., Conversation specification: a new approach to design and analysis of e-service composition, in Proc. 12th Int. Conf. World Wide Web (WWW'03) (ACM Press, 20-24 May, 2003), pp. 403-410.
    • (2003) Proc. 12th Int. Conf. World Wide Web (WWW'03) , pp. 403-410
    • Bultan, T.1
  • 19
    • 0037343253 scopus 로고    scopus 로고
    • Adding roles to CORBA objects
    • March
    • C. Canal et al., Adding roles to CORBA objects, IEEE Trans. Software Engineering (TSE) 29(3) (March 2003) 242-260.
    • (2003) IEEE Trans. Software Engineering (TSE) , vol.29 , Issue.3 , pp. 242-260
    • Canal, C.1
  • 20
    • 0031699648 scopus 로고    scopus 로고
    • Workflow evolution
    • January
    • F. Casati et al., Workflow evolution, Data Knowledge Eng. 24(3) (January 1998) 211-238.
    • (1998) Data Knowledge Eng. , vol.24 , Issue.3 , pp. 211-238
    • Casati, F.1
  • 23
    • 0036328418 scopus 로고    scopus 로고
    • Unraveling the web services web: An introduction to SOAP, WSDL, and UDDI
    • March/April
    • F. Curbera et al., Unraveling the web services web: An introduction to SOAP, WSDL, and UDDI, IEEE Internet Computing 6(2) (March/April 2002) 86-93.
    • (2002) IEEE Internet Computing , vol.6 , Issue.2 , pp. 86-93
    • Curbera, F.1
  • 24
    • 10444270464 scopus 로고    scopus 로고
    • ebXML, www.ebxml.org.
  • 25
    • 84992227458 scopus 로고    scopus 로고
    • Proposed NIST standard for role-based access control
    • August
    • D. Ferraiolo et al., Proposed NIST standard for role-based access control, ACM Trans. Information and System Security (TISSEC) 4(3) (August 2001) 224-274.
    • (2001) ACM Trans. Information and System Security (TISSEC) , vol.4 , Issue.3 , pp. 224-274
    • Ferraiolo, D.1
  • 27
    • 1142297676 scopus 로고    scopus 로고
    • XML key management specification (XKMS)
    • March
    • W. Ford et al., XML Key Management Specification (XKMS), W3C Note (March 2001), www.w3.org/TR/xkms.
    • (2001) W3C Note
    • Ford, W.1
  • 28
    • 4544231767 scopus 로고    scopus 로고
    • W3C Recommendation (June)
    • M. Gudgin et al. (eds.), SOAP Version 1.2, W3C Recommendation (June 2003), www.w3.org/TR/SOAP.
    • (2003) SOAP Version 1.2
    • Gudgin, M.1
  • 30
    • 0033724294 scopus 로고    scopus 로고
    • Access control meets public key infrastructure, Or: Assigning roles to strangers
    • May
    • A. Herzberg et al., Access control meets public key infrastructure, Or: Assigning roles to strangers, in Proc. IEEE Symp. Security and Privacy (May 2000).
    • (2000) Proc. IEEE Symp. Security and Privacy
    • Herzberg, A.1
  • 32
    • 0003308762 scopus 로고    scopus 로고
    • Internet X.509 public key infrastructure certificate and CRL profile
    • January
    • R. Housley et al., Internet X.509 Public Key Infrastructure Certificate and CRL Profile, IETF RFC 2459 (January 1999).
    • (1999) IETF RFC , vol.2459
    • Housley, R.1
  • 33
    • 1542386863 scopus 로고    scopus 로고
    • E-services: A look behind the curtain
    • San Diego, CA, USA (ACM, June)
    • R. Hull et al., E-services: A look behind the curtain, in Proc. 22th Principles of Database Systems (PODS'03), San Diego, CA, USA (ACM, June 2003), pp. 1-14.
    • (2003) Proc. 22th Principles of Database Systems (PODS'03) , pp. 1-14
    • Hull, R.1
  • 42
    • 0345597843 scopus 로고    scopus 로고
    • Compatibility of e-services in a cooperative multi-platform environment
    • Rome, Italy, ser. eds. F. Casati, D. Georgakopoulos and M.-C. Shan, Lecture Notes in Computer Science, (Springer, September)
    • M. Mecella, B. Pernici and P. Craca, Compatibility of e-services in a cooperative multi-platform environment, in TES, Rome, Italy, ser. eds. F. Casati, D. Georgakopoulos and M.-C. Shan, Lecture Notes in Computer Science, Vol. 2193 (Springer, September 2001), pp. 14-15.
    • (2001) TES , vol.2193 , pp. 14-15
    • Mecella, M.1    Pernici, B.2    Craca, P.3
  • 43
    • 0141502298 scopus 로고    scopus 로고
    • Special issue on model-driven development
    • S. Mellor, A. N. Clark and T. Futagami, Special issue on model-driven development, IEEE Software 20(5) (2003).
    • (2003) IEEE Software , vol.20 , Issue.5
    • Mellor, S.1    Clark, A.N.2    Futagami, T.3
  • 45
    • 0036036590 scopus 로고    scopus 로고
    • Deriving executable process descriptions from UML
    • IEEE Society, May
    • E. D. Nitto et al., Deriving executable process descriptions from UML, Int. Conf. Software Engineering (ICSE'02) (IEEE Society, May 2002).
    • (2002) Int. Conf. Software Engineering (ICSE'02)
    • Nitto, E.D.1
  • 46
    • 4243048792 scopus 로고    scopus 로고
    • Special issue on service-oriented computing
    • M. P. Papazoglou and D. Georgakopoulos, Special issue on service-oriented computing, Commun. ACM 46(10) (2003) 24-28.
    • (2003) Commun. ACM , vol.46 , Issue.10 , pp. 24-28
    • Papazoglou, M.P.1    Georgakopoulos, D.2
  • 47
    • 79960026230 scopus 로고    scopus 로고
    • Tentative Hold Protocol
    • November
    • J. Roberts and K. Srinivasan, Tentative Hold Protocol, W3C Note (November 2003), www.w3.org/TR/tenthold-1.
    • (2003) W3C Note
    • Roberts, J.1    Srinivasan, K.2
  • 48
    • 0345903651 scopus 로고    scopus 로고
    • Atomicity and isolation for transactional processes
    • H. Schuldt et al., Atomicity and isolation for transactional processes, ACM Trans. Database Systems (TODS) 27(1) (2002) 63-116.
    • (2002) ACM Trans. Database Systems (TODS) , vol.27 , Issue.1 , pp. 63-116
    • Schuldt, H.1
  • 49
    • 0037547050 scopus 로고    scopus 로고
    • SELF-SERV: A platform for rapid composition of web services in a peer-to-peer environment
    • Morgan Kaufmann, San Francisco, August
    • Q. Z. Sheng et al., SELF-SERV: A platform for rapid composition of web services in a peer-to-peer environment, in Proc. 28th Conf. Very Large Data Bases (VLDB'02) (Morgan Kaufmann, San Francisco, August 2002).
    • (2002) Proc. 28th Conf. Very Large Data Bases (VLDB'02)
    • Sheng, Q.Z.1
  • 50
    • 1142301944 scopus 로고    scopus 로고
    • Model-driven trust negotiation for web services
    • November/December
    • H. Skogsrud, B. Benatallah and F. Casati, Model-driven trust negotiation for web services, IEEE Internet Computing 7(6) (November/December 2003) 45-52.
    • (2003) IEEE Internet Computing , vol.7 , Issue.6 , pp. 45-52
    • Skogsrud, H.1    Benatallah, B.2    Casati, F.3
  • 51
    • 19944408999 scopus 로고    scopus 로고
    • Trust-Serv: Model-driven lifecycle management of trust negotiation policies for web services
    • (ACM Press, New York, May) to appear
    • H. Skogsrud, B. Benatallah and F. Casati, Trust-Serv: Model-driven lifecycle management of trust negotiation policies for web services, in Proc. 13th World Wide Web Conf. (WWW 2004) (ACM Press, New York, May 2004), to appear.
    • (2004) Proc. 13th World Wide Web Conf. (WWW 2004)
    • Skogsrud, H.1    Benatallah, B.2    Casati, F.3
  • 54
    • 10444249814 scopus 로고    scopus 로고
    • current April
    • VeriSign, Trust Services Integration Kit (TSIK) (current April 2003), www.xmltrustcenter.org/developer/verisign/tsik.
    • (2003) Trust Services Integration Kit (TSIK)
  • 55
    • 0036871183 scopus 로고    scopus 로고
    • Negotiating trust on the web
    • November/December
    • M. Winslett et al., Negotiating trust on the web, IEEE Internet Computing 6(6) (November/December 2002) 30-37.
    • (2002) IEEE Internet Computing , vol.6 , Issue.6 , pp. 30-37
    • Winslett, M.1
  • 56
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • February
    • T. Yu, M. Winslett and K. Seamons, Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation, ACM Trans. Information and System Security (TISSEC) 6(1) (February 2003).
    • (2003) ACM Trans. Information and System Security (TISSEC) , vol.6 , Issue.1
    • Yu, T.1    Winslett, M.2    Seamons, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.