-
1
-
-
33750514985
-
An adaptive access control model for web services
-
Bertino E., Squicciarini A.C., Martino L., and Paci F. An adaptive access control model for web services. International Journal of Web Services Research 3 3 (2006) 27-60
-
(2006)
International Journal of Web Services Research
, vol.3
, Issue.3
, pp. 27-60
-
-
Bertino, E.1
Squicciarini, A.C.2
Martino, L.3
Paci, F.4
-
2
-
-
34247127921
-
Service-oriented computing
-
Bichler M., and Lin K.-J. Service-oriented computing. IEEE Computer 39 3 (2006) 99-101
-
(2006)
IEEE Computer
, vol.39
, Issue.3
, pp. 99-101
-
-
Bichler, M.1
Lin, K.-J.2
-
3
-
-
36348997518
-
Improving web service discovery with usage data
-
Birukou A., Blanzieri E., D'Andrea V., Giorgini P., and Kokash N. Improving web service discovery with usage data. IEEE Software 24 6 (2007) 47-54
-
(2007)
IEEE Software
, vol.24
, Issue.6
, pp. 47-54
-
-
Birukou, A.1
Blanzieri, E.2
D'Andrea, V.3
Giorgini, P.4
Kokash, N.5
-
4
-
-
68649123090
-
E-readiness or digital exclusion-evaluating a country's status
-
Athens, Greece
-
Bolissian J., Pimendis E., liadis L., and Andreopoulou Z. E-readiness or digital exclusion-evaluating a country's status. Proceedings of the 2nd E-Democracy National Conference with International Participation, Athens Bar Association and the Scientific Council for the Information Society. Athens, Greece (2006) 87-96
-
(2006)
Proceedings of the 2nd E-Democracy National Conference with International Participation, Athens Bar Association and the Scientific Council for the Information Society
, pp. 87-96
-
-
Bolissian, J.1
Pimendis, E.2
liadis, L.3
Andreopoulou, Z.4
-
5
-
-
0142074003
-
Web Services Architecture, W3C Working Group Note 11, February
-
Booth, D., Haas, H., McCabe, F., Newcomer, E., Champion, M., Ferris, C., Orchard, D. 2004. Web Services Architecture, W3C Working Group Note 11, February, W3C Technical Reports and Publications, http://www.w3.org/TR/ws-arch/.
-
(2004)
W3C Technical Reports and Publications
-
-
Booth, D.1
Haas, H.2
McCabe, F.3
Newcomer, E.4
Champion, M.5
Ferris, C.6
Orchard, D.7
-
6
-
-
46849116239
-
A policy-based evaluation framework for quality and security in service oriented architectures
-
Salt Lake City, UT, USA
-
Casola V., Fasolino A.R., Mazzocca N.P., and Tramontana P. A policy-based evaluation framework for quality and security in service oriented architectures. Proceedings of the IEEE International Conference on Web Services ICWS 2007. Salt Lake City, UT, USA (2007) 1181-1190
-
(2007)
Proceedings of the IEEE International Conference on Web Services ICWS 2007
, pp. 1181-1190
-
-
Casola, V.1
Fasolino, A.R.2
Mazzocca, N.P.3
Tramontana, P.4
-
7
-
-
38949127239
-
Evaluation and modeling of web services performance
-
Chicago, IL, USA
-
Chen S., Yan B., Zic J., Liu R., and Ng A. Evaluation and modeling of web services performance. Proceedings of the IEEE International Conference on Web Services ICWS 2006. Chicago, IL, USA (2006) 437-444
-
(2006)
Proceedings of the IEEE International Conference on Web Services ICWS 2006
, pp. 437-444
-
-
Chen, S.1
Yan, B.2
Zic, J.3
Liu, R.4
Ng, A.5
-
8
-
-
46849087758
-
Performance evaluation and modeling of web services security
-
Salt Lake City, UT, USA
-
Chen S., Zic J., Tang K., and Levy D. Performance evaluation and modeling of web services security. Proceedings of the IEEE International Conference on Web Services ICWS 2007. Salt Lake City, UT, USA (2007) 431-438
-
(2007)
Proceedings of the IEEE International Conference on Web Services ICWS 2007
, pp. 431-438
-
-
Chen, S.1
Zic, J.2
Tang, K.3
Levy, D.4
-
9
-
-
33750718550
-
A heuristic approach to semantic web services classification
-
Bournemouth, UK Proceedings, Part III, Lecture Notes in Computer Science, vol. 4253, 2006
-
Corella M.A., and Castells P. A heuristic approach to semantic web services classification. Knowledge-Based Intelligent Information and Engineering Systems, Proceedings of the10th International Conference, KES 2006. Bournemouth, UK (2006) 598-605 Proceedings, Part III, Lecture Notes in Computer Science, vol. 4253, 2006
-
(2006)
Knowledge-Based Intelligent Information and Engineering Systems, Proceedings of the10th International Conference, KES 2006
, pp. 598-605
-
-
Corella, M.A.1
Castells, P.2
-
11
-
-
3042585572
-
The next step in web services
-
Curbera F., Khalaf R., Mukhi N., Tai S., and Weerawarana S. The next step in web services. Communications of the ACM 46 10 (2003) 29-34
-
(2003)
Communications of the ACM
, vol.46
, Issue.10
, pp. 29-34
-
-
Curbera, F.1
Khalaf, R.2
Mukhi, N.3
Tai, S.4
Weerawarana, S.5
-
12
-
-
34547260252
-
No registration needed: how to use declarative policies and negotiation to access sensitive resources on the semantic web
-
Heraklion, Greece
-
Gavriloaie R., Nejdl W., Olmedilla D., Seamons K.E., and Winslett M. No registration needed: how to use declarative policies and negotiation to access sensitive resources on the semantic web. Proceedings of the 1st European Semantic Web Symposium. Heraklion, Greece (2004) 342-356
-
(2004)
Proceedings of the 1st European Semantic Web Symposium
, pp. 342-356
-
-
Gavriloaie, R.1
Nejdl, W.2
Olmedilla, D.3
Seamons, K.E.4
Winslett, M.5
-
16
-
-
77954460692
-
The advantages of web service orchestration in perspective
-
Gortmaker J., Janssen M., and Wagenaar R.W. The advantages of web service orchestration in perspective. Proceedings of the ICEC'04, Sixth International Conference on Electronic Commerce, ACM (2004) 506-515
-
(2004)
Proceedings of the ICEC'04, Sixth International Conference on Electronic Commerce, ACM
, pp. 506-515
-
-
Gortmaker, J.1
Janssen, M.2
Wagenaar, R.W.3
-
17
-
-
17044394776
-
The effect of trust assumptions on the elaboration of security requirements
-
Kyoto, Japan
-
Haley C.B., Laney R.C., Moffett J.D., and Nuseibeh B. The effect of trust assumptions on the elaboration of security requirements. Proceedings of the 12th IEEE International Requirements Engineering Conference (RE'04). Kyoto, Japan (2004) 102-111
-
(2004)
Proceedings of the 12th IEEE International Requirements Engineering Conference (RE'04)
, pp. 102-111
-
-
Haley, C.B.1
Laney, R.C.2
Moffett, J.D.3
Nuseibeh, B.4
-
19
-
-
38349079995
-
-
Little, M., 2007. WS-CAF: Contexts, Coordination and Transactions for Web Services. In: Meersman, R., Tari, Z. et al. (Eds.). OTM 2007, Part I, LNCS 4803, pp. 439-453.
-
Little, M., 2007. WS-CAF: Contexts, Coordination and Transactions for Web Services. In: Meersman, R., Tari, Z. et al. (Eds.). OTM 2007, Part I, LNCS vol. 4803, pp. 439-453.
-
-
-
-
21
-
-
33646877234
-
Web services interoperability specifications
-
Motahari-Nezhad H.R., Benatallah B., Casati F., and Toumani F. Web services interoperability specifications. IEEE Computer 39 5 (2006) 24-32
-
(2006)
IEEE Computer
, vol.39
, Issue.5
, pp. 24-32
-
-
Motahari-Nezhad, H.R.1
Benatallah, B.2
Casati, F.3
Toumani, F.4
-
22
-
-
19944423406
-
Using mobile phones for secure, distributed document processing in the developing world
-
Parikh T.S. Using mobile phones for secure, distributed document processing in the developing world. IEEE Pervasive Computing 4 2 (2005) 74-81
-
(2005)
IEEE Pervasive Computing
, vol.4
, Issue.2
, pp. 74-81
-
-
Parikh, T.S.1
-
23
-
-
0742285890
-
DakNet: rethinking connectivity in developing nations
-
Pentland A., Fletcher R., and Hasson A. DakNet: rethinking connectivity in developing nations. IEEE Computer 37 1 (2004) 78-83
-
(2004)
IEEE Computer
, vol.37
, Issue.1
, pp. 78-83
-
-
Pentland, A.1
Fletcher, R.2
Hasson, A.3
-
24
-
-
30644473909
-
Adaptive trust negotiation and access control
-
Stockholm, Sweden
-
Ryutov T., Zhou L., Neuman C., Leithead T., and Seamons K.E. Adaptive trust negotiation and access control. Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT 2005). Stockholm, Sweden (2005) 139-146
-
(2005)
Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT 2005)
, pp. 139-146
-
-
Ryutov, T.1
Zhou, L.2
Neuman, C.3
Leithead, T.4
Seamons, K.E.5
-
25
-
-
38749143691
-
A performance evaluation of web services security
-
Honk Kong, China
-
Tang K., Chen S., Levy D., Zic J., and Yan B. A performance evaluation of web services security. Proceedings of the 10th IEEE International Enterprise Distributed Object Computing Conference EDOC'06. Honk Kong, China (2006) 67-74
-
(2006)
Proceedings of the 10th IEEE International Enterprise Distributed Object Computing Conference EDOC'06
, pp. 67-74
-
-
Tang, K.1
Chen, S.2
Levy, D.3
Zic, J.4
Yan, B.5
-
27
-
-
29744457703
-
Models for semantic interoperability in service-oriented architectures
-
Vetere L., and Lenzerini M. Models for semantic interoperability in service-oriented architectures. IBM Systems Journal 44 4 (2005) 887-903
-
(2005)
IBM Systems Journal
, vol.44
, Issue.4
, pp. 887-903
-
-
Vetere, L.1
Lenzerini, M.2
-
28
-
-
27144508833
-
-
Prentice Hall, Upper Saddle River, NJ, USA
-
Weerawarana S., Curbera F., Leymann F., Storey T., and Ferguson D. Web Services Platform Architecture (2006), Prentice Hall, Upper Saddle River, NJ, USA
-
(2006)
Web Services Platform Architecture
-
-
Weerawarana, S.1
Curbera, F.2
Leymann, F.3
Storey, T.4
Ferguson, D.5
-
29
-
-
84953887858
-
Using web service enhancements to bridge business trust relationships
-
University of Toronto, Institute of Technology, Markham, Ontario, Canada
-
Wu Z., and Weaver A.C. Using web service enhancements to bridge business trust relationships. Proceedings of the Fourth International Conference on Privacy, Security, and Trust: Bridge the Gap Between PST Technologies and Business Services (PST'06). University of Toronto, Institute of Technology, Markham, Ontario, Canada (2006)
-
(2006)
Proceedings of the Fourth International Conference on Privacy, Security, and Trust: Bridge the Gap Between PST Technologies and Business Services (PST'06)
-
-
Wu, Z.1
Weaver, A.C.2
-
31
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
Yu T., Winslett M., and Seamons K. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security 6 1 (2003) 1-42
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.3
|