메뉴 건너뛰기




Volumn 31, Issue 18, 2008, Pages 4312-4323

Self-optimization of secure web services

Author keywords

Autonomic; Performance prediction; Security evaluation; Self optimization; Web services

Indexed keywords

INFORMATION SERVICES; OPTIMIZATION; WORLD WIDE WEB;

EID: 56949090403     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2008.05.045     Document Type: Article
Times cited : (10)

References (27)
  • 1
    • 56949091015 scopus 로고    scopus 로고
    • D. Booth, H. Haas, F. McCabe, E. Newcomer, M. Champion, C. Ferris, D. Orchard, Web Services Architecture, W3C Web Services Architecture Working group, February 2004.
    • D. Booth, H. Haas, F. McCabe, E. Newcomer, M. Champion, C. Ferris, D. Orchard, Web Services Architecture, W3C Web Services Architecture Working group, February 2004.
  • 2
    • 0010404950 scopus 로고    scopus 로고
    • Document management and web technologies: Alice marries the Mad Hatter
    • Balasubramanian V., and Bashian A. Document management and web technologies: Alice marries the Mad Hatter. Communications of the ACM 41 7 (1998) 107-115
    • (1998) Communications of the ACM , vol.41 , Issue.7 , pp. 107-115
    • Balasubramanian, V.1    Bashian, A.2
  • 5
    • 56949083976 scopus 로고    scopus 로고
    • F. Cohen, Discover SOAP encoding's impact on web service performance, in: IBM DeveloperWorks, IBM Corporation, 2003, URL http://www-106.ibm.com/developerworks/webservices/library/ws-soapenc.
    • F. Cohen, Discover SOAP encoding's impact on web service performance, in: IBM DeveloperWorks, IBM Corporation, 2003, URL http://www-106.ibm.com/developerworks/webservices/library/ws-soapenc.
  • 6
    • 0036928336 scopus 로고    scopus 로고
    • S. Chandrasekaran, G. Silver, J.A. Miller, J. Cardoso, A.P. Sheth, Web service technologies and their synergy with simulation, in: Proceedings of the 2002 Winter Simulation Conference, vol. 1, ACM, San Diego, California, USA, 2002, pp. 606-615.
    • S. Chandrasekaran, G. Silver, J.A. Miller, J. Cardoso, A.P. Sheth, Web service technologies and their synergy with simulation, in: Proceedings of the 2002 Winter Simulation Conference, vol. 1, ACM, San Diego, California, USA, 2002, pp. 606-615.
  • 8
    • 56949083429 scopus 로고    scopus 로고
    • V. Casola, L. Coppolino, M. Rak, An architectural model for trusted domains in web services, Journal of Information Assurance and Security, 1 (2) 107-118.
    • V. Casola, L. Coppolino, M. Rak, An architectural model for trusted domains in web services, Journal of Information Assurance and Security, 1 (2) 107-118.
  • 9
    • 56949100877 scopus 로고    scopus 로고
    • T. Beth, M. Borcherding, B. Klein, Valuation of trust in open networks, in: D. Gollman (Ed.), Computer Security - ESORICS '94, Lecture Notes in Computer Science, Springer-Verlag, 1994, No. 875, pp. 3-18.
    • T. Beth, M. Borcherding, B. Klein, Valuation of trust in open networks, in: D. Gollman (Ed.), Computer Security - ESORICS '94, Lecture Notes in Computer Science, Springer-Verlag, 1994, No. 875, pp. 3-18.
  • 10
    • 56949085213 scopus 로고    scopus 로고
    • J. Bicarregui, T. Dimitrakos, B. Matthews, Towards security and trust management policies on the web, 2000.
    • J. Bicarregui, T. Dimitrakos, B. Matthews, Towards security and trust management policies on the web, 2000.
  • 11
    • 56949096711 scopus 로고    scopus 로고
    • G. Della-Libera, et al., Web services security policy language version 1.1, 2005.
    • G. Della-Libera, et al., Web services security policy language version 1.1, 2005.
  • 12
    • 56949099375 scopus 로고    scopus 로고
    • B. Atkinson, et al. Ws-security specification, web services security version 1.0 05, OASIS, April 2002.
    • B. Atkinson, et al. Ws-security specification, web services security version 1.0 05, OASIS, April 2002.
  • 13
    • 56949105751 scopus 로고    scopus 로고
    • A.S. Vedamuthu, et al., Ws-policy specification, web services policy framework, W3C, September 2004.
    • A.S. Vedamuthu, et al., Ws-policy specification, web services policy framework, W3C, September 2004.
  • 14
    • 4644316411 scopus 로고    scopus 로고
    • J. Chung, J. Zhang, L. Zhang, Ws-trustworthy: a framework for web services centered trustworthy computing, in: Proceedings of the IEEE international conference on Services Computing (SCC 04), IEEE Computer Society, Shanghai, China, 2004, pp. 186-193.
    • J. Chung, J. Zhang, L. Zhang, Ws-trustworthy: a framework for web services centered trustworthy computing, in: Proceedings of the IEEE international conference on Services Computing (SCC 04), IEEE Computer Society, Shanghai, China, 2004, pp. 186-193.
  • 15
    • 4544349729 scopus 로고    scopus 로고
    • K.P. Birman, R. van Renesse, W. Vogels, Adding high availability and autonomic behavior to web services, in: Proceedings of the 26th International Conference on Software Engineering (ICSE 2004), IEEE Computer Society, Edinburgh, United Kingdom, 2004, pp. 17-26.
    • K.P. Birman, R. van Renesse, W. Vogels, Adding high availability and autonomic behavior to web services, in: Proceedings of the 26th International Conference on Software Engineering (ICSE 2004), IEEE Computer Society, Edinburgh, United Kingdom, 2004, pp. 17-26.
  • 16
    • 56949086094 scopus 로고    scopus 로고
    • IBM Corp., An architectural blueprint for autonomic computing, IBM Corporation, USA, 2004, URL www-3.ibm.com/autonomic/pdfs/ACBP2_2004-10-04.pdf.
    • IBM Corp., An architectural blueprint for autonomic computing, IBM Corporation, USA, 2004, URL www-3.ibm.com/autonomic/pdfs/ACBP2_2004-10-04.pdf.
  • 17
    • 0037253062 scopus 로고    scopus 로고
    • The vision of autonomic computing
    • Kephart J.O., and Chess D.M. The vision of autonomic computing. IEEE Computer 36 1 (2003) 41-50
    • (2003) IEEE Computer , vol.36 , Issue.1 , pp. 41-50
    • Kephart, J.O.1    Chess, D.M.2
  • 18
    • 56949105626 scopus 로고    scopus 로고
    • Y. Zhang, A. Liu, W. Qu, Software architecture design of an autonomic system, in: Proceedings of the Fifth Australasian Workshop on Software and System Architectures, Melbourne, Australia, 2004, pp. 5-11.
    • Y. Zhang, A. Liu, W. Qu, Software architecture design of an autonomic system, in: Proceedings of the Fifth Australasian Workshop on Software and System Architectures, Melbourne, Australia, 2004, pp. 5-11.
  • 21
    • 1642587890 scopus 로고    scopus 로고
    • E. Mancini, N. Mazzocca, M. Rak, U. Villano, Integrated tools for performance-oriented distributed software development., in: Proceedings of the SERP'03 Conference, vol. 1, Las Vegas (NE), USA, 2003, pp. 88-94.
    • E. Mancini, N. Mazzocca, M. Rak, U. Villano, Integrated tools for performance-oriented distributed software development., in: Proceedings of the SERP'03 Conference, vol. 1, Las Vegas (NE), USA, 2003, pp. 88-94.
  • 22
    • 0036989099 scopus 로고    scopus 로고
    • N. Mazzocca, M. Rak, U. Villano, The MetaPL approach to the performance analysis of distributed software systems, in: Proceedings of the Third International Workshop on Software and Performance (WOSP02), IEEE Press, 2002, pp. 142-149.
    • N. Mazzocca, M. Rak, U. Villano, The MetaPL approach to the performance analysis of distributed software systems, in: Proceedings of the Third International Workshop on Software and Performance (WOSP02), IEEE Press, 2002, pp. 142-149.
  • 23
    • 23844470859 scopus 로고    scopus 로고
    • A reference model for security level evaluation: policy and fuzzy techniques
    • Preziosi R., Rak M., Troiano L., and Casola V. A reference model for security level evaluation: policy and fuzzy techniques. Journal of Universal Computer Science 11 1 (2005) 150-174
    • (2005) Journal of Universal Computer Science , vol.11 , Issue.1 , pp. 150-174
    • Preziosi, R.1    Rak, M.2    Troiano, L.3    Casola, V.4
  • 24
    • 56949097963 scopus 로고    scopus 로고
    • OSSTMM, Open source security testing methodology manual.
    • OSSTMM, Open source security testing methodology manual.
  • 25
    • 56949102298 scopus 로고    scopus 로고
    • I.C.E. Levin T.E., S.E., Quality of Security Service: Adaptive Security - Handbook of Information Security, Wiley Computer Publishing John Wiley & Sons, 2006.
    • I.C.E. Levin T.E., S.E., Quality of Security Service: Adaptive Security - Handbook of Information Security, Wiley Computer Publishing John Wiley & Sons, 2006.
  • 27
    • 84937554317 scopus 로고    scopus 로고
    • MetaPL a notation system for parallel program description and performance analysis parallel computing technologies
    • Parallel Computing Technologies. second ed. Malyshkin V. (Ed), Springer-Verlag, Berlin (DE)
    • Mazzocca N., Rak M., and Villano U. MetaPL a notation system for parallel program description and performance analysis parallel computing technologies. In: Malyshkin V. (Ed). Parallel Computing Technologies. second ed. Lecture Notes in Computer Science vol. 2127 (2001), Springer-Verlag, Berlin (DE) 80-93
    • (2001) Lecture Notes in Computer Science , vol.2127 , pp. 80-93
    • Mazzocca, N.1    Rak, M.2    Villano, U.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.