-
1
-
-
70449339956
-
Specification and satisfaction of SLAs in service oriented architectures
-
Anderson, S., Grau, A., and Hughes, C. 2005. Specification and satisfaction of SLAs in service oriented architectures. In 5th Annual DIRC Research Conference 141-150.
-
(2005)
5th Annual DIRC Research Conference
, pp. 141-150
-
-
Anderson, S.1
Grau, A.2
Hughes, C.3
-
2
-
-
33749044797
-
Global and local QoS constraints guarantee in Web service selection
-
DOI 10.1109/ICWS.2005.66, 1530883, Proceedings - 2005 IEEE International Conference on Web Services, ICWS 2005
-
Ardagna, D. and Pernici, B. 2005. Global and local QoS constraints guarantee in web service selection. In IEEE International Conference onWeb Services (ICWS '05) 805-806. (Pubitemid 44460285)
-
(2005)
Proceedings - 2005 IEEE International Conference on Web Services, ICWS 2005
, vol.2005
, pp. 805-806
-
-
Ardagna, D.1
Pernici, B.2
-
4
-
-
0142078514
-
-
LSDIS Lab,University ofGeorgia,Technical Report #02-002
-
Cardoso, J.,Miller, J., Sheth, A., and Arnold, J. 2002.Modeling quality-of-service for workflows andWeb service processes. LSDIS Lab,University ofGeorgia,Technical Report #02-002.
-
(2002)
Modeling Quality-of-service for Workflows and Web Service Processes
-
-
Cardoso, J.1
Miller, J.2
Sheth, A.3
Arnold, J.4
-
5
-
-
77649294224
-
-
Retrieved March 20, 2009 from
-
Computer Emergency Response Team (CERT). 2009. Retrieved March 20, 2009 from: http://www.cert.org.
-
(2009)
-
-
-
8
-
-
33144458586
-
Software security and SOA
-
Epstein, J., Matsumoto, S., and McGraw, G. 2006. Software security and SOA. IEEE Security and Privacy 4(1): 80-83.
-
(2006)
IEEE Security and Privacy
, vol.4
, Issue.1
, pp. 80-83
-
-
Epstein, J.1
Matsumoto, S.2
McGraw, G.3
-
9
-
-
33749069452
-
Using patterns to understand and compare web services security products and standards
-
Fernandez, E. B. andDelessy,N. 2006. Using patterns to understand and compare web services security products and standards. AICT 157-168.
-
(2006)
AICT
, pp. 157-168
-
-
Fernandez, E.B.1
Delessy, N.2
-
11
-
-
67650960627
-
An optimal QoS-based web service selection scheme
-
Huang, A. F. M., Lan, C.-W., and Yang, S. J. H. 2009. An optimal QoS-based web service selection scheme. Information Sciences 179: 3309-3322.
-
(2009)
Information Sciences
, vol.179
, pp. 3309-3322
-
-
Huang, A.F.M.1
Lan, C.-W.2
Yang, S.J.H.3
-
13
-
-
30944436477
-
QoS aggregation in web service compositions
-
Jaeger, M. C., Rojec-Goldmann, G., and Muhl, G. 2005. QoS aggregation in web service compositions. In IEEE International Conference on e-Technology, e-Commerce and e-Service 181-185.
-
(2005)
IEEE International Conference on E-Technology, E-Commerce and E-Service
, pp. 181-185
-
-
Jaeger, M.C.1
Rojec-Goldmann, G.2
Muhl, G.3
-
17
-
-
67349268506
-
Composing semanticWeb services under constraints
-
Karakoc, E. and Senkul, P. 2009. Composing semanticWeb services under constraints. Expert Systems with Applications 36: 11021-11029.
-
(2009)
Expert Systems with Applications
, vol.36
, pp. 11021-11029
-
-
Karakoc, E.1
Senkul, P.2
-
18
-
-
0042795913
-
The WSLA framework: Specifying and monitoring service level agreements for web services
-
May 2002
-
Keller, A. and Ludwig, H. 2002. The WSLA framework: Specifying and monitoring service level agreements for web services. IBM Research Report May 2002.
-
(2002)
IBM Research Report
-
-
Keller, A.1
Ludwig, H.2
-
19
-
-
70849102441
-
Opracowanie koncepcji specyfikacji metod i modeli szacowania poziomu bezpieczeñstwa systemów SOA i SOKU
-
Kolaczek, G. 2009. Opracowanie koncepcji specyfikacji metod i modeli szacowania poziomu bezpieczeñstwa systemów SOA i SOKU, WUT (in Polish).
-
(2009)
WUT (In Polish)
-
-
Kolaczek, G.1
-
20
-
-
33646503483
-
Towards an ontology-based approach for specifying and securing Web services
-
Maamara, Z., Narendrab, Z., and Sattanathan, S. 2006. Towards an ontology-based approach for specifying and securing Web services. Information and Software Technology 48: 441-455.
-
(2006)
Information and Software Technology
, vol.48
, pp. 441-455
-
-
Maamara, Z.1
Narendrab, Z.2
Sattanathan, S.3
-
21
-
-
11044239442
-
Current solutions for web service composition
-
Milanovic, N. and Malek, M. 2004. Current solutions for web service composition. IEEE Internet Computing 8(6): 51-59.
-
(2004)
IEEE Internet Computing
, vol.8
, Issue.6
, pp. 51-59
-
-
Milanovic, N.1
Malek, M.2
-
22
-
-
33749040692
-
Model-driven security based on web services security architecture
-
Nakamura, Y., Tatsubori, M., Imamura, T., and Ono, K. 2005. Model-driven security based on web services security architecture. IEEE Int. Conference on Services Computing 1: 7-15.
-
(2005)
IEEE Int. Conference on Services Computing
, vol.1
, pp. 7-15
-
-
Nakamura, Y.1
Tatsubori, M.2
Imamura, T.3
Ono, K.4
-
23
-
-
24144441759
-
A survey of automated web service composition methods
-
San Diego, CA
-
Rao, J. and Su, X. 2004. A survey of automated web service composition methods. In Semantic Web Services andWeb Process Composition, (SWSWPC) 2004. San Diego, CA, 43-54.
-
(2004)
Semantic Web Services and Web Process Composition, (SWSWPC) 2004
, pp. 43-54
-
-
Rao, J.1
Su, X.2
-
24
-
-
77649318447
-
-
Institute, Retrieved March 20, 2009 from
-
SysAdmin, Audit, Network, Security (SANS) Institute. 2006. RetrievedMarch 20, 2009 from http://www.sans.org.
-
(2006)
-
-
-
25
-
-
84954104016
-
Trust by verify: Authorization for web services
-
Paper presented at the
-
Skalka, C. andWang, X. 2004. Trust by verify: Authorization for web services. Paper presented at the ACMWorkshop on SecureWeb Services, 47-55.
-
(2004)
ACM Workshop on Secure Web Services
, pp. 47-55
-
-
Skalka, C.1
Wang, X.2
-
27
-
-
77649315019
-
-
Saddle River, NJ: Pearson. WS-Security Policy 1.2 (OASIS)
-
Steel, C., Nagappan, R., and Lai, R. 2006. Core security patterns: Best practices and strategies for J2EE, web services, and identity management. Upper Saddle River, NJ: Pearson. WS-Security Policy 1.2 (OASIS), 2009.
-
(2006)
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
, vol.2009
-
-
Steel, C.1
Nagappan, R.2
Lai, R.3
|