-
1
-
-
84856088437
-
-
EC Research Programme Committee, European Commission, Tech. Rep., [Online]. Available
-
EC Research Programme Committee, "ICT FP7 Work Programme 2011-12," European Commission, Tech. Rep., 2010. [Online]. Available: http://cordis.europa.eu/fp7/ict/ programme/home en.html
-
(2010)
ICT FP7 Work Programme 2011-12
-
-
-
2
-
-
79952905352
-
Service-oriented computing: A research roadmap
-
Service Oriented Computing (SOC), ser.
-
M. P. Papazoglou, P. Traverso, S. Dustdar, F. Leymann, and B. J. Krmer, "Service-oriented computing: A research roadmap," in Service Oriented Computing (SOC), ser. Dagstuhl Seminar Proceedings, 2006.
-
Dagstuhl Seminar Proceedings, 2006
-
-
Papazoglou, M.P.1
Traverso, P.2
Dustdar, S.3
Leymann, F.4
Krmer, B.J.5
-
3
-
-
84856092785
-
-
Tech. Rep., [Online]. Available
-
J. Williams and D. Wichers, "The owasp 2010 top 10,"The Open Web Application Security Project, Tech. Rep., 2010. [Online]. Available: http://www.owasp.org/index.php/Top 10 2010
-
(2010)
The Owasp 2010 Top 10
-
-
Williams, J.1
Wichers, D.2
-
4
-
-
78650325121
-
-
TippingPoint, Qualys, the Internet Storm Center Tech. Rep., [Online]. Available
-
R. Dhamankar, M. Dausin, M. Eisenbarth, J. King, W. Kandek, J. Ullrich, E. Skoudis, and R. Lee, "The top cyber security risks," TippingPoint, Qualys, the Internet Storm Center and the SANS Institute faculty, Tech. Rep., 2009. [Online]. Available: http://www.sans.org/top-cyber-security-risks/
-
(2009)
The Top Cyber Security Risks
-
-
Dhamankar, R.1
Dausin, M.2
Eisenbarth, M.3
King, J.4
Kandek, W.5
Ullrich, J.6
Skoudis, E.7
Lee, R.8
-
5
-
-
18744370279
-
Cooperative and group testing in verification of dynamic composite web services
-
Proceedings of the 28th Annual International Computer Software and Applications Conference - Workshops and Fast Abstracts - ser. Washington, DC, USA: IEEE Computer Society, [Online]. Available
-
W. T. Tsai, Y. Chen, R. Paul, N. Liao, and H. Huang, "Cooperative and group testing in verification of dynamic composite web services," in Proceedings of the 28th Annual International Computer Software and Applications Conference - Workshops and Fast Abstracts - Volume 02, ser. COMPSAC '04. Washington, DC, USA: IEEE Computer Society, 2004, pp. 170-173. [Online]. Available: http://dl.acm.org/citation.cfm?id=1025118.1025616
-
(2004)
COMPSAC '04
, vol.2
, pp. 170-173
-
-
Tsai, W.T.1
Chen, Y.2
Paul, R.3
Liao, N.4
Huang, H.5
-
6
-
-
84856118858
-
Mixed initiative use cases for semi-automated service composition: A survey
-
Shanghai, China: ACM
-
J. Schaffner and H. Meyer, "Mixed initiative use cases for semi-automated service composition: a survey," in SOSE '06. Shanghai, China: ACM, 2006, pp. 6-12.
-
(2006)
SOSE '06
, pp. 6-12
-
-
Schaffner, J.1
Meyer, H.2
-
7
-
-
22244433521
-
Composition-driven filtering and selection of semantic web services
-
E. Sirin, B. Parsia, and J. Hendler, "Composition-driven filtering and selection of semantic web services," in In AAAI Spring Symposium on Semantic Web Services, 2004, pp. 2004-2004.
-
AAAI Spring Symposium on Semantic Web Services, 2004
, pp. 2004-2004
-
-
Sirin, E.1
Parsia, B.2
Hendler, J.3
-
8
-
-
78449261307
-
-
Naval Research Lab Washington DC, Tech. Rep., [Online]. Available
-
A. Kim, M. Kang, C. Meadows, E. Ioup, and J. Sample, "A framework for automatic web service composition," Naval Research Lab Washington DC, Tech. Rep., 2009. [Online]. Available: http://handle.dtic.mil/100.2/ADA499917
-
(2009)
A Framework for Automatic Web Service Composition
-
-
Kim, A.1
Kang, M.2
Meadows, C.3
Ioup, E.4
Sample, J.5
-
9
-
-
22944435846
-
Accuracy of metrics for inferring trust and reputation in semantic web-based social networks
-
Engineering Knowledge in the Age of the SemanticWeb, ser. Springer
-
J. Golbeck and J. Hendler, "Accuracy of metrics for inferring trust and reputation in semantic web-based social networks,"in Engineering Knowledge in the Age of the SemanticWeb, ser. Lecture Notes in Computer Science. Springer, 2004, pp. 116-131.
-
(2004)
Lecture Notes in Computer Science
, pp. 116-131
-
-
Golbeck, J.1
Hendler, J.2
-
10
-
-
84880467894
-
The eigentrust algorithm for reputation management in p2p networks
-
Budapest, Hungary: ACM
-
S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, "The eigentrust algorithm for reputation management in p2p networks,"in Proceedings of the 12th international conference on World Wide Web. Budapest, Hungary: ACM, 2003, pp. 640-651.
-
(2003)
Proceedings of the 12th International Conference on World Wide Web
, pp. 640-651
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Garcia-Molina, H.3
-
11
-
-
41849109865
-
Online check-in easy to hack
-
K. Munro, "Online check-in easy to hack," Infosecurity, vol. 5, no. 3, p. 41, 2008.
-
(2008)
Infosecurity
, vol.5
, Issue.3
, pp. 41
-
-
Munro, K.1
-
14
-
-
30344442772
-
Seven pernicious kingdoms: A taxonomy of software security errors
-
DOI 10.1109/MSP.2005.159
-
K. Tsipenyuk, B. Chess, and G. McGraw, "Seven pernicious kingdoms: A taxonomy of software security errors," IEEE Security and Privacy, vol. 3, pp. 81-84, November 2005. (Pubitemid 43060401)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.6
, pp. 81-84
-
-
Tsipenyuk, K.1
Chess, B.2
McGraw, G.3
-
15
-
-
36348977135
-
-
[Online]. Available
-
MITRE, "The common weakness enumeration," 2011. [Online]. Available: http://cwe.mitre.org/
-
(2011)
The Common Weakness Enumeration
-
-
-
16
-
-
0032096714
-
Certifying off-the-shelf software components
-
Jun.
-
J. Voas, "Certifying off-the-shelf software components," Computer, vol. 31, no. 6, pp. 53 -59, Jun. 1998.
-
(1998)
Computer
, vol.31
, Issue.6
, pp. 53-59
-
-
Voas, J.1
-
18
-
-
12844284330
-
-
C. Landwehr, A. R. Bull, J. P. Mcdermott, William, and S. Choi, "A taxonomy of computer program security flaws, with examples," 1993.
-
(1993)
A Taxonomy of Computer Program Security Flaws, with Examples
-
-
Landwehr, C.1
Bull, A.R.2
Mcdermott, J.P.3
William4
Choi, S.5
-
19
-
-
84856093557
-
-
Seventh Framework Programme, Trustworthy ICT, Tech. Rep., [Online]. Available
-
Aniketos - Secure and Trustworthy Composite Services, "Methods and design for the response to changes and threats," Seventh Framework Programme, Trustworthy ICT, Tech. Rep., 2011. [Online]. Available: http://www.aniketos.eu/content/deliverables
-
(2011)
Methods and Design for the Response to Changes and Threats
-
-
|