-
1
-
-
78651441477
-
Service Oriented Computing Is Overrated: Information Infrastructure Problems Cannot be Solved by Service Oriented Computing (soc) Alone. Pro or Con?
-
Nov
-
L.-J. Zhang and D.A. Grier, “Service Oriented Computing Is Overrated: Information Infrastructure Problems Cannot be Solved by Service Oriented Computing (soc) Alone. Pro or Con?” Business Week, Nov. 2008
-
(2008)
Business Week
-
-
Zhang, L.-J.1
Grier, D.A.2
-
2
-
-
4243048792
-
Service-Oriented Computing: Introduction
-
M.P. Papazoglou and D. Georgakopoulos, “Service-Oriented Computing: Introduction,” Comm. ACM, vol. 46, no. 10, pp. 24–28, 2003
-
(2003)
Comm. ACM
, vol.46
, Issue.10
, pp. 24-28
-
-
Papazoglou, M.P.1
Georgakopoulos, D.2
-
3
-
-
0003791651
-
Web Services Description Language (WSDL) 1.1
-
technical report, World Wide Web Consortium
-
E. Christensen, F. Curbera, G. Meredith, and S. Weerawarana, “Web Services Description Language (WSDL) 1.1,” technical report, World Wide Web Consortium, 2001
-
(2001)
-
-
Christensen, E.1
Curbera, F.2
Meredith, G.3
Weerawarana, S.4
-
4
-
-
20444446006
-
Smart Monitors for Composed Services
-
L. Baresi, C. Ghezzi, and S. Guinea, “Smart Monitors for Composed Services,” Proc. Int'l Conf. Service Oriented Computing (ICSOC '04), pp. 193–202, 2004
-
(2004)
Proc. Int'l Conf. Service Oriented Computing (ICSOC '04)
, pp. 193-202
-
-
Baresi, L.1
Ghezzi, C.2
Guinea, S.3
-
5
-
-
38049187813
-
Run-Time Monitoring of Instances and Classes of Web Service Compositions
-
F. Barbon, P. Traverso, M. Pistore, and M. Trainotti, “Run-Time Monitoring of Instances and Classes of Web Service Compositions,” Proc. Int'l Conf. Web Services (ICWS '06), pp. 63–71, 2006
-
(2006)
Proc. Int'l Conf. Web Services (ICWS '06)
, pp. 63-71
-
-
Barbon, F.1
Traverso, P.2
Pistore, M.3
Trainotti, M.4
-
6
-
-
33747127813
-
Run-Time Monitoring of Requirements for Systems Composed of Web-Services: Initial Implementation and Evaluation Experience
-
K. Mahbub and G. Spanoudakis, “Run-Time Monitoring of Requirements for Systems Composed of Web-Services: Initial Implementation and Evaluation Experience,” Proc. Int'l Conf. Web Services (ICWS '05), pp. 257–265, 2005
-
(2005)
Proc. Int'l Conf. Web Services (ICWS '05)
, pp. 257-265
-
-
Mahbub, K.1
Spanoudakis, G.2
-
7
-
-
34548110060
-
Expressing and Reasoning about Service Contracts in Service-Oriented Computing
-
D. Kuo, A. Fekete, P. Greenfield, S. Nepal, J. Zic, S. Parastatidis, and J. Webber, “Expressing and Reasoning about Service Contracts in Service-Oriented Computing,” Proc. Int'l Conf. Web Services (ICWS '06), pp. 915–918, 2006
-
(2006)
Proc. Int'l Conf. Web Services (ICWS '06)
, pp. 915-918
-
-
Kuo, D.1
Fekete, A.2
Greenfield, P.3
Nepal, S.4
Zic, J.5
Parastatidis, S.6
Webber, J.7
-
8
-
-
85027197002
-
Reconciling System Requirements and Runtime Behavior
-
M.S. Feather, S. Fickas, A.V. Lamsweerde, and C. Ponsard, “Reconciling System Requirements and Runtime Behavior,” Proc. Int'l Work. Software Specifications & Design (IWSSD '98), p. 50, 1998
-
(1998)
Proc. Int'l Work. Software Specifications & Design (IWSSD '98)
, pp. 50
-
-
Feather, M.S.1
Fickas, S.2
Lamsweerde, A.V.3
Ponsard, C.4
-
10
-
-
33344463655
-
Monitoring and Control in Scenario-Based Requirements Analysis
-
E. Letier, J. Kramer, J. Magee, and S. Uchitel, “Monitoring and Control in Scenario-Based Requirements Analysis,” Proc. Int'l Conf. Software Eng. (ICSE '05), pp. 382–391, 2005
-
(2005)
Proc. Int'l Conf. Software Eng. (ICSE '05)
, pp. 382-391
-
-
Letier, E.1
Kramer, J.2
Magee, J.3
Uchitel, S.4
-
12
-
-
85084162270
-
Design and Implementation of a TCG-Based Integrity Measurement Architecture
-
Aug
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn, “Design and Implementation of a TCG-Based Integrity Measurement Architecture,” Proc. 13th Usenix Security Symp., pp. 223–238, Aug. 2004
-
(2004)
Proc. 13th Usenix Security Symp
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
van Doorn, L.4
-
13
-
-
19944361984
-
The Role of TPM in Enterprise Security
-
Technical Report, IBM Research, Oct
-
R. Sailer, L. van Doorn, and J.P. Ward, “The Role of TPM in Enterprise Security,” Technical Report, IBM Research, Oct. 2004
-
(2004)
-
-
Sailer, R.1
van Doorn, L.2
Ward, J.P.3
-
15
-
-
41149173577
-
Monitoring the Monitor: An Approach Towards Trustworthiness in Service Oriented Architecture
-
Sept
-
M. Hosamani, H. Narayanappa, and H. Rajan, “Monitoring the Monitor: An Approach Towards Trustworthiness in Service Oriented Architecture,” Proc. Second Int'l Workshop Service Oriented Software Eng. (IW-SOSWE '07), pp. 42–46, Sept. 2007
-
(2007)
Proc. Second Int'l Workshop Service Oriented Software Eng. (IW-SOSWE '07)
, pp. 42-46
-
-
Hosamani, M.1
Narayanappa, H.2
Rajan, H.3
-
16
-
-
85008051994
-
Web Services Security (ws-security)
-
C. Kaler et al., “Web Services Security (ws-security),” http://msdn.microsoft.com/library/enus/dnglobspec/html/ ws-security.asp, 2008
-
(2008)
-
-
Kaler, C.1
-
17
-
-
78651466129
-
Web Services Trust Language (wstrust)
-
S. Anderson et al., “Web Services Trust Language (wstrust),” http://msdn.microsoft.com/ws/2004/04/ws-trust, 2008
-
(2008)
-
-
Anderson, S.1
-
18
-
-
34548793482
-
Managing Impacts of Security Protocol Changes in Service-Oriented Applications
-
H. Skogsrud, B. Benatallah, F. Casati, and F. Toumani, “Managing Impacts of Security Protocol Changes in Service-Oriented Applications,” Proc. IEEE Int'l Conf. Software Eng., 2007
-
(2007)
Proc. IEEE Int'l Conf. Software Eng
-
-
Skogsrud, H.1
Benatallah, B.2
Casati, F.3
Toumani, F.4
-
19
-
-
78650450194
-
Trusted Computing Group
-
“Trusted Computing Group,” http://www.trustedcomputing group.org, 2009
-
(2009)
-
-
-
20
-
-
78651462536
-
TPM Main Part 1 Design Principles Specification Version 1.2
-
“TPM Main Part 1 Design Principles Specification Version 1.2,” http://www.trustedcomputinggroup.org/specs/TPM, 2009
-
(2009)
-
-
-
21
-
-
78651446842
-
Microsoft Next-Generation Secure Computing Base
-
“Microsoft Next-Generation Secure Computing Base,” http://www.microsoft.com/resources/ngscb, 2008
-
(2008)
-
-
-
22
-
-
77954339628
-
Trusted Platform Module (TPM) Based Security on Notebook PCs—white paper
-
S. Bajikar, “Trusted Platform Module (TPM) Based Security on Notebook PCs—white paper,” Technical Report, Mobile Platforms Group Intel Corporation, June 2002
-
(2002)
-
-
Bajikar, S.1
-
24
-
-
85008066812
-
The Perseus Architecture
-
Technical Report RZ3335 (#93381), IBM Research Division, Apr
-
B. Pfitzmann, J. Riordan, C. Stuble, M. Waidner, and A. Weber, “The Perseus Architecture,” Technical Report RZ3335 (#93381), IBM Research Division, Apr. 2001
-
(2001)
-
-
Pfitzmann, B.1
Riordan, J.2
Stuble, C.3
Waidner, M.4
Weber, A.5
-
26
-
-
26844578344
-
Collision Search Attacks on SHA1
-
X. Wang, Y.L. Yin, and H. Yu, “Collision Search Attacks on SHA1,” http://www.cryptome.org/sha-attacks.htm, 2008
-
(2008)
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
27
-
-
0001867722
-
The Temporal Logic of Programs
-
Technical Report, Weizmann Science Press
-
A. Pnueli, “The Temporal Logic of Programs,” Technical Report, Weizmann Science Press, 1997
-
(1997)
-
-
Pnueli, A.1
-
28
-
-
41149100339
-
Projektvorstellung tpm4java Trusted Computing fur Java
-
E. Tews and M. Hermanowski, “Projektvorstellung tpm4java Trusted Computing fur Java,” http://tpm4java.datenzone.de, 2009
-
(2009)
-
-
Tews, E.1
Hermanowski, M.2
-
29
-
-
85008031879
-
TM
-
TM,” http://www.tangentum.biz, 2009
-
(2009)
-
-
-
34
-
-
78651451351
-
Tisa: A Language Design and Modular Verification Technique for Temporal Policies in Web Services
-
Technical Report, Mar
-
H. Rajan, J. Tao, S.M. Shaner, and G.T. Leavens, “Tisa: A Language Design and Modular Verification Technique for Temporal Policies in Web Services,” Technical Report, Mar. 2009
-
(2009)
-
-
Rajan, H.1
Tao, J.2
Shaner, S.M.3
Leavens, G.T.4
-
36
-
-
85008005638
-
BCEL Homepage
-
BCEL Homepage, http://jakarta.apache.org/bcel, 2009
-
(2009)
-
-
-
37
-
-
82955230066
-
An Overview of AspectJ
-
G. Kiczales, E. Hilsdale, J. Hugunin, M. Kersten, J. Palm, and W.G. Griswold, “An Overview of AspectJ,” Proc. (ECOOP '01), pp. 327–353, 2001
-
(2001)
Proc. (ECOOP '01)
, pp. 327-353
-
-
Kiczales, G.1
Hilsdale, E.2
Hugunin, J.3
Kersten, M.4
Palm, J.5
Griswold, W.G.6
-
42
-
-
18844367955
-
Virtual Machine Support for Dynamic Join Points
-
C. Bockisch, M. Haupt, M. Mezini, and K. Ostermann, “Virtual Machine Support for Dynamic Join Points,” Proc. Third Int'l Conf. Aspect-Oriented Software Development (AOSD '04), pp. 83–92, 2004
-
(2004)
Proc. Third Int'l Conf. Aspect-Oriented Software Development (AOSD '04)
, pp. 83-92
-
-
Bockisch, C.1
Haupt, M.2
Mezini, M.3
Ostermann, K.4
-
44
-
-
33749064387
-
WS-Attestation: Efficient and Fine-Grained Remote Attestation on Web Services
-
July
-
S. Yoshihama, T. Ebringer, M. Nakamura, S. Munetoh, and H. Maruyama, “WS-Attestation: Efficient and Fine-Grained Remote Attestation on Web Services,” Proc. IEEE Int'l Conf. Web Services (ICWS '05), July 2005
-
(2005)
Proc. IEEE Int'l Conf. Web Services (ICWS '05)
-
-
Yoshihama, S.1
Ebringer, T.2
Nakamura, M.3
Munetoh, S.4
Maruyama, H.5
-
45
-
-
34547148412
-
Layering Negotiations for Flexible Attestation
-
Nov
-
Y. Katsuno, Y. Watanabe, S. Yoshihama, T. Mishina, and M. Kudoh, “Layering Negotiations for Flexible Attestation,” Proc. First ACM Workshop Scalable Trusted Computing, Nov. 2006
-
(2006)
Proc. First ACM Workshop Scalable Trusted Computing
-
-
Katsuno, Y.1
Watanabe, Y.2
Yoshihama, S.3
Mishina, T.4
Kudoh, M.5
-
46
-
-
33749078188
-
Resilient Trust Management for Web Service Integration
-
S. Park, L. Liu, C. Pu, M. Srivatsa, and J. Zhang, “Resilient Trust Management for Web Service Integration,” Proc. IEEE Int'l Conf. Web Services (ICWS '05), pp. 499–506, 2005
-
(2005)
Proc. IEEE Int'l Conf. Web Services (ICWS '05)
, pp. 499-506
-
-
Park, S.1
Liu, L.2
Pu, C.3
Srivatsa, M.4
Zhang, J.5
-
47
-
-
1542300219
-
Preserving Privacy in Web Services
-
A. Rezgui, M. Ouzzani, A. Bouguettaya, and B. Medjahed, “Preserving Privacy in Web Services,” Proc. ACM Workshops Web Information and Data Management (WIDM '02), pp. 56–62, 2002
-
(2002)
Proc. ACM Workshops Web Information and Data Management (WIDM '02)
, pp. 56-62
-
-
Rezgui, A.1
Ouzzani, M.2
Bouguettaya, A.3
Medjahed, B.4
-
48
-
-
35148867225
-
Modeling Non-Functional Aspects in Service Oriented Architecture
-
H. Wada, J. Suzuki, and K. Oba, “Modeling Non-Functional Aspects in Service Oriented Architecture,” Proc. IEEE Int'l Conf. Services Computing (SCC '06), pp. 222–229, 2006
-
(2006)
Proc. IEEE Int'l Conf. Services Computing (SCC '06)
, pp. 222-229
-
-
Wada, H.1
Suzuki, J.2
Oba, K.3
-
49
-
-
33646721094
-
Testing Services and Service-Centric Systems: Challenges and Opportunities
-
G. Canfora and M.D. Penta, “Testing Services and Service-Centric Systems: Challenges and Opportunities,” IT Professional, vol. 8, no. 2, pp. 1–17, 2006
-
(2006)
IT Professional
, vol.8
, Issue.2
, pp. 1-17
-
-
Canfora, G.1
Penta, M.D.2
-
51
-
-
26844492006
-
Validating a Web Service Security Abstraction by Typing
-
Oct
-
A.D. Gordon and R. Pucella, “Validating a Web Service Security Abstraction by Typing,” Formal Aspects of Computing, vol. 17, no. 3, pp. 277–318, Oct. 2005
-
(2005)
Formal Aspects of Computing
, vol.17
, Issue.3
, pp. 277-318
-
-
Gordon, A.D.1
Pucella, R.2
|