메뉴 건너뛰기




Volumn , Issue , 2011, Pages 1-6

Service injection: A threat to self-managed complex systems

Author keywords

dynamic service composition; self management; SOA; system of systems; threat

Indexed keywords

DYNAMIC SERVICE COMPOSITION; SELF MANAGEMENT; SOA; SYSTEM-OF-SYSTEMS; THREAT;

EID: 84856104767     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DASC.2011.25     Document Type: Conference Paper
Times cited : (5)

References (19)
  • 1
    • 84856088437 scopus 로고    scopus 로고
    • EC Research Programme Committee, European Commission, Tech. Rep., [Online]. Available
    • EC Research Programme Committee, "ICT FP7 Work Programme 2011-12," European Commission, Tech. Rep., 2010. [Online]. Available: http://cordis.europa.eu/fp7/ict/ programme/home en.html
    • (2010) ICT FP7 Work Programme 2011-12
  • 3
    • 84856092785 scopus 로고    scopus 로고
    • Tech. Rep., [Online]. Available
    • J. Williams and D. Wichers, "The owasp 2010 top 10,"The Open Web Application Security Project, Tech. Rep., 2010. [Online]. Available: http://www.owasp.org/index.php/Top 10 2010
    • (2010) The Owasp 2010 Top 10
    • Williams, J.1    Wichers, D.2
  • 5
    • 18744370279 scopus 로고    scopus 로고
    • Cooperative and group testing in verification of dynamic composite web services
    • Proceedings of the 28th Annual International Computer Software and Applications Conference - Workshops and Fast Abstracts - ser. Washington, DC, USA: IEEE Computer Society, [Online]. Available
    • W. T. Tsai, Y. Chen, R. Paul, N. Liao, and H. Huang, "Cooperative and group testing in verification of dynamic composite web services," in Proceedings of the 28th Annual International Computer Software and Applications Conference - Workshops and Fast Abstracts - Volume 02, ser. COMPSAC '04. Washington, DC, USA: IEEE Computer Society, 2004, pp. 170-173. [Online]. Available: http://dl.acm.org/citation.cfm?id=1025118.1025616
    • (2004) COMPSAC '04 , vol.2 , pp. 170-173
    • Tsai, W.T.1    Chen, Y.2    Paul, R.3    Liao, N.4    Huang, H.5
  • 6
    • 84856118858 scopus 로고    scopus 로고
    • Mixed initiative use cases for semi-automated service composition: A survey
    • Shanghai, China: ACM
    • J. Schaffner and H. Meyer, "Mixed initiative use cases for semi-automated service composition: a survey," in SOSE '06. Shanghai, China: ACM, 2006, pp. 6-12.
    • (2006) SOSE '06 , pp. 6-12
    • Schaffner, J.1    Meyer, H.2
  • 9
    • 22944435846 scopus 로고    scopus 로고
    • Accuracy of metrics for inferring trust and reputation in semantic web-based social networks
    • Engineering Knowledge in the Age of the SemanticWeb, ser. Springer
    • J. Golbeck and J. Hendler, "Accuracy of metrics for inferring trust and reputation in semantic web-based social networks,"in Engineering Knowledge in the Age of the SemanticWeb, ser. Lecture Notes in Computer Science. Springer, 2004, pp. 116-131.
    • (2004) Lecture Notes in Computer Science , pp. 116-131
    • Golbeck, J.1    Hendler, J.2
  • 11
    • 41849109865 scopus 로고    scopus 로고
    • Online check-in easy to hack
    • K. Munro, "Online check-in easy to hack," Infosecurity, vol. 5, no. 3, p. 41, 2008.
    • (2008) Infosecurity , vol.5 , Issue.3 , pp. 41
    • Munro, K.1
  • 14
    • 30344442772 scopus 로고    scopus 로고
    • Seven pernicious kingdoms: A taxonomy of software security errors
    • DOI 10.1109/MSP.2005.159
    • K. Tsipenyuk, B. Chess, and G. McGraw, "Seven pernicious kingdoms: A taxonomy of software security errors," IEEE Security and Privacy, vol. 3, pp. 81-84, November 2005. (Pubitemid 43060401)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.6 , pp. 81-84
    • Tsipenyuk, K.1    Chess, B.2    McGraw, G.3
  • 15
    • 36348977135 scopus 로고    scopus 로고
    • [Online]. Available
    • MITRE, "The common weakness enumeration," 2011. [Online]. Available: http://cwe.mitre.org/
    • (2011) The Common Weakness Enumeration
  • 16
    • 0032096714 scopus 로고    scopus 로고
    • Certifying off-the-shelf software components
    • Jun.
    • J. Voas, "Certifying off-the-shelf software components," Computer, vol. 31, no. 6, pp. 53 -59, Jun. 1998.
    • (1998) Computer , vol.31 , Issue.6 , pp. 53-59
    • Voas, J.1
  • 19
    • 84856093557 scopus 로고    scopus 로고
    • Seventh Framework Programme, Trustworthy ICT, Tech. Rep., [Online]. Available
    • Aniketos - Secure and Trustworthy Composite Services, "Methods and design for the response to changes and threats," Seventh Framework Programme, Trustworthy ICT, Tech. Rep., 2011. [Online]. Available: http://www.aniketos.eu/content/deliverables
    • (2011) Methods and Design for the Response to Changes and Threats


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.