메뉴 건너뛰기




Volumn 41, Issue 1, 2010, Pages 46-61

Smart security assessment of composed web services

Author keywords

Multi agent systems; Security; Web services

Indexed keywords

ASSESMENT; EVALUATION CRITERIA; FUNCTIONAL LAYER; LAYERED SECURITY; MULTI-AGENT APPROACH; PRECISE DEFINITION; SECURITY ASSESSMENT; SECURITY EVALUATION; SECURITY LEVEL; SUBJECTIVE LOGIC;

EID: 77649319139     PISSN: 01969722     EISSN: 10876553     Source Type: Journal    
DOI: 10.1080/01969720903408797     Document Type: Conference Paper
Times cited : (11)

References (27)
  • 1
    • 70449339956 scopus 로고    scopus 로고
    • Specification and satisfaction of SLAs in service oriented architectures
    • Anderson, S., Grau, A., and Hughes, C. 2005. Specification and satisfaction of SLAs in service oriented architectures. In 5th Annual DIRC Research Conference 141-150.
    • (2005) 5th Annual DIRC Research Conference , pp. 141-150
    • Anderson, S.1    Grau, A.2    Hughes, C.3
  • 2
    • 33749044797 scopus 로고    scopus 로고
    • Global and local QoS constraints guarantee in Web service selection
    • DOI 10.1109/ICWS.2005.66, 1530883, Proceedings - 2005 IEEE International Conference on Web Services, ICWS 2005
    • Ardagna, D. and Pernici, B. 2005. Global and local QoS constraints guarantee in web service selection. In IEEE International Conference onWeb Services (ICWS '05) 805-806. (Pubitemid 44460285)
    • (2005) Proceedings - 2005 IEEE International Conference on Web Services, ICWS 2005 , vol.2005 , pp. 805-806
    • Ardagna, D.1    Pernici, B.2
  • 3
    • 51749120547 scopus 로고    scopus 로고
    • Techniques to produce optimal web service compositions
    • Blanco, E., Vidal, Y., and Graterol, J. 2008. Techniques to produce optimal web service compositions. IEEE Congress on Services 553-558.
    • (2008) IEEE Congress on Services , pp. 553-558
    • Blanco, E.1    Vidal, Y.2    Graterol, J.3
  • 5
    • 77649294224 scopus 로고    scopus 로고
    • Retrieved March 20, 2009 from
    • Computer Emergency Response Team (CERT). 2009. Retrieved March 20, 2009 from: http://www.cert.org.
    • (2009)
  • 9
    • 33749069452 scopus 로고    scopus 로고
    • Using patterns to understand and compare web services security products and standards
    • Fernandez, E. B. andDelessy,N. 2006. Using patterns to understand and compare web services security products and standards. AICT 157-168.
    • (2006) AICT , pp. 157-168
    • Fernandez, E.B.1    Delessy, N.2
  • 11
    • 67650960627 scopus 로고    scopus 로고
    • An optimal QoS-based web service selection scheme
    • Huang, A. F. M., Lan, C.-W., and Yang, S. J. H. 2009. An optimal QoS-based web service selection scheme. Information Sciences 179: 3309-3322.
    • (2009) Information Sciences , vol.179 , pp. 3309-3322
    • Huang, A.F.M.1    Lan, C.-W.2    Yang, S.J.H.3
  • 17
    • 67349268506 scopus 로고    scopus 로고
    • Composing semanticWeb services under constraints
    • Karakoc, E. and Senkul, P. 2009. Composing semanticWeb services under constraints. Expert Systems with Applications 36: 11021-11029.
    • (2009) Expert Systems with Applications , vol.36 , pp. 11021-11029
    • Karakoc, E.1    Senkul, P.2
  • 18
    • 0042795913 scopus 로고    scopus 로고
    • The WSLA framework: Specifying and monitoring service level agreements for web services
    • May 2002
    • Keller, A. and Ludwig, H. 2002. The WSLA framework: Specifying and monitoring service level agreements for web services. IBM Research Report May 2002.
    • (2002) IBM Research Report
    • Keller, A.1    Ludwig, H.2
  • 19
    • 70849102441 scopus 로고    scopus 로고
    • Opracowanie koncepcji specyfikacji metod i modeli szacowania poziomu bezpieczeñstwa systemów SOA i SOKU
    • Kolaczek, G. 2009. Opracowanie koncepcji specyfikacji metod i modeli szacowania poziomu bezpieczeñstwa systemów SOA i SOKU, WUT (in Polish).
    • (2009) WUT (In Polish)
    • Kolaczek, G.1
  • 20
    • 33646503483 scopus 로고    scopus 로고
    • Towards an ontology-based approach for specifying and securing Web services
    • Maamara, Z., Narendrab, Z., and Sattanathan, S. 2006. Towards an ontology-based approach for specifying and securing Web services. Information and Software Technology 48: 441-455.
    • (2006) Information and Software Technology , vol.48 , pp. 441-455
    • Maamara, Z.1    Narendrab, Z.2    Sattanathan, S.3
  • 21
    • 11044239442 scopus 로고    scopus 로고
    • Current solutions for web service composition
    • Milanovic, N. and Malek, M. 2004. Current solutions for web service composition. IEEE Internet Computing 8(6): 51-59.
    • (2004) IEEE Internet Computing , vol.8 , Issue.6 , pp. 51-59
    • Milanovic, N.1    Malek, M.2
  • 24
    • 77649318447 scopus 로고    scopus 로고
    • Institute, Retrieved March 20, 2009 from
    • SysAdmin, Audit, Network, Security (SANS) Institute. 2006. RetrievedMarch 20, 2009 from http://www.sans.org.
    • (2006)
  • 25
    • 84954104016 scopus 로고    scopus 로고
    • Trust by verify: Authorization for web services
    • Paper presented at the
    • Skalka, C. andWang, X. 2004. Trust by verify: Authorization for web services. Paper presented at the ACMWorkshop on SecureWeb Services, 47-55.
    • (2004) ACM Workshop on Secure Web Services , pp. 47-55
    • Skalka, C.1    Wang, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.