메뉴 건너뛰기




Volumn , Issue , 2013, Pages 131-138

Privacy-aware web service composition and ranking

Author keywords

Privacy; We service ranking; Web service composition

Indexed keywords

COMPLIANCE CONTROL; DATA PRIVACY; QUALITY OF SERVICE; WEBSITES;

EID: 84891791089     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICWS.2013.27     Document Type: Conference Paper
Times cited : (35)

References (33)
  • 1
    • 84863617430 scopus 로고    scopus 로고
    • A hybrid approach for efficient web service composition with end-to-end qos constraints
    • M. Alrifai, T. Risse, and W. Nejdl, "A hybrid approach for efficient web service composition with end-to-end qos constraints," TWEB, vol. 6, no. 2, pp. 7:1-7:31, 2012.
    • (2012) TWEB , vol.6 , Issue.2
    • Alrifai, M.1    Risse, T.2    Nejdl, W.3
  • 3
    • 58749111839 scopus 로고    scopus 로고
    • On the functional quality of service (fqos) to discover and compose interoperable web services
    • B. Jeong, H. Cho, and C. Lee, "On the functional quality of service (fqos) to discover and compose interoperable web services," Expert Syst. Appl., vol. 36, no. 3, pp. 5411-5418, 2009.
    • (2009) Expert Syst. Appl. , vol.36 , Issue.3 , pp. 5411-5418
    • Jeong, B.1    Cho, H.2    Lee, C.3
  • 4
    • 67549130563 scopus 로고    scopus 로고
    • QoS Based Ranking for Web Services: Fuzzy Approaches
    • V. X. Tran and H. Tsuji, "QoS Based Ranking for Web Services: Fuzzy Approaches," in Proc. of NWeSP, 2008, pp. 77-82.
    • Proc. of NWeSP, 2008 , pp. 77-82
    • Tran, V.X.1    Tsuji, H.2
  • 5
    • 35148889393 scopus 로고    scopus 로고
    • A Fuzzy Model for Selection of QoS-Aware Web Services
    • IEEE
    • P. Wang, K.-M. Chao, C.-C. Lo, C.-L. Huang, and Y. Li, "A Fuzzy Model for Selection of QoS-Aware Web Services," in Proc. of ICEBE. IEEE, 2006, pp. 585-593.
    • (2006) Proc. of ICEBE , pp. 585-593
    • Wang, P.1    Chao, K.-M.2    Lo, C.-C.3    Huang, C.-L.4    Li, Y.5
  • 6
    • 20444480301 scopus 로고    scopus 로고
    • Toward autonomic web services trust and selection
    • ACM
    • E. M. Maximilien and M. P. Singh, "Toward autonomic web services trust and selection," in Proc. of SOC. ACM, 2004, pp. 212-221.
    • (2004) Proc. of SOC , pp. 212-221
    • Maximilien, E.M.1    Singh, M.P.2
  • 7
    • 70449492751 scopus 로고    scopus 로고
    • Integrating behavioral trust in web service compositions
    • IEEE
    • S. Paradesi, P. Doshi, and S. Swaika, "Integrating behavioral trust in web service compositions," in Proc. of ICWS. IEEE, 2009, pp. 453-460.
    • (2009) Proc. of ICWS , pp. 453-460
    • Paradesi, S.1    Doshi, P.2    Swaika, S.3
  • 9
    • 46849122689 scopus 로고    scopus 로고
    • Reputation-Enhanced QoS-based Web Services Discovery
    • IEEE
    • Z. Xu, P. Martin, W. Powley, and F. Zulkernine, "Reputation-Enhanced QoS-based Web Services Discovery," in Proc. of ICWS. IEEE, 2007, pp. 249-256.
    • (2007) Proc. of ICWS , pp. 249-256
    • Xu, Z.1    Martin, P.2    Powley, W.3    Zulkernine, F.4
  • 10
    • 36049032185 scopus 로고    scopus 로고
    • Hierarchical hippocratic databases with minimal disclosure for virtual organizations
    • F. Massacci, J. Mylopoulos, and N. Zannone, "Hierarchical hippocratic databases with minimal disclosure for virtual organizations," VLDB J., vol. 15, no. 4, pp. 370-387, 2006.
    • (2006) VLDB J. , vol.15 , Issue.4 , pp. 370-387
    • Massacci, F.1    Mylopoulos, J.2    Zannone, N.3
  • 11
    • 80053158921 scopus 로고    scopus 로고
    • A privacy-preserving approach for web service selection and provisioning
    • IEEE
    • A. Squicciarini, B. Carminati, and S. Karumanchi, "A privacy-preserving approach for web service selection and provisioning," in Proc. of ICWS. IEEE, 2011, pp. 33-40.
    • (2011) Proc. of ICWS , pp. 33-40
    • Squicciarini, A.1    Carminati, B.2    Karumanchi, S.3
  • 12
    • 80052804889 scopus 로고    scopus 로고
    • Privacy-Aware DaaS Services Composition
    • Database and Expert Systems Applications, ser. Springer
    • S.-E. Tbahriti, M. Mrissa, B. Medjahed, C. Ghedira, M. Barhamgi, and J. Fayn, "Privacy-Aware DaaS Services Composition," in Database and Expert Systems Applications, ser. LNCS 6860. Springer, 2011, pp. 202-216.
    • (2011) LNCS , vol.6860 , pp. 202-216
    • Tbahriti, S.-E.1    Mrissa, M.2    Medjahed, B.3    Ghedira, C.4    Barhamgi, M.5    Fayn, J.6
  • 13
    • 84862330428 scopus 로고    scopus 로고
    • Privacy and recovery in composite web service transactions
    • R. Hewett and P. Kijsanayothin, "Privacy and recovery in composite web service transactions," International Journal for Infonomics, vol. 3, no. 2, pp. 240-248, 2010.
    • (2010) International Journal for Infonomics , vol.3 , Issue.2 , pp. 240-248
    • Hewett, R.1    Kijsanayothin, P.2
  • 14
    • 38949158735 scopus 로고    scopus 로고
    • A framework for building privacy-conscious composite web services
    • IEEE
    • W. Xu, V. N. Venkatakrishnan, R. Sekar, and I. V. Ramakrishnan, "A framework for building privacy-conscious composite web services," in Proc. of ICWS. IEEE, 2006, pp. 655-662.
    • (2006) Proc. of ICWS , pp. 655-662
    • Xu, W.1    Venkatakrishnan, V.N.2    Sekar, R.3    Ramakrishnan, I.V.4
  • 16
    • 71749095793 scopus 로고    scopus 로고
    • Ws-engineer: A model-based approach to engineering web service compositions and choreography
    • Springer
    • H. Foster, S. Uchitel, J. Magee, and J. Kramer, "Ws-engineer: A model-based approach to engineering web service compositions and choreography," in Test and Analysis of Web Services. Springer, 2007, pp. 87-119.
    • (2007) Test and Analysis of Web Services , pp. 87-119
    • Foster, H.1    Uchitel, S.2    Magee, J.3    Kramer, J.4
  • 17
    • 4544339500 scopus 로고    scopus 로고
    • A Petri net-based model for web service composition
    • Australian Computer Society, Inc.
    • R. Hamadi and B. Benatallah, "A Petri net-based model for web service composition," in Proc. of ADC. Australian Computer Society, Inc., 2003, pp. 191-200.
    • (2003) Proc. of ADC , pp. 191-200
    • Hamadi, R.1    Benatallah, B.2
  • 18
    • 84959051487 scopus 로고    scopus 로고
    • Formal verification of e-services and workflows
    • Web Services, E-Business, and the Semantic Web, ser. Springer
    • X. Fu, T. Bultan, and J. Su, "Formal verification of e-services and workflows," in Web Services, E-Business, and the Semantic Web, ser. LNCS 2512. Springer, 2002, pp. 188-202.
    • (2002) LNCS , vol.2512 , pp. 188-202
    • Fu, X.1    Bultan, T.2    Su, J.3
  • 19
    • 20444435185 scopus 로고    scopus 로고
    • Synthesis of underspecified composite e-services based on automated reasoning
    • ACM
    • D. Berardi, G. D. Giacomo, M. Lenzerini, M. Mecella, and D. Calvanese, "Synthesis of underspecified composite e-services based on automated reasoning," in Proc. of SOC. ACM, 2004, pp. 105-114.
    • (2004) Proc. of SOC , pp. 105-114
    • Berardi, D.1    Giacomo, G.D.2    Lenzerini, M.3    Mecella, M.4    Calvanese, D.5
  • 20
    • 75649136935 scopus 로고    scopus 로고
    • Requirementsdriven collaborative choreography customization
    • Proc. of ICSOC, ser. Springer
    • A. Mahfouz, L. Barroca, R. C. Laney, and B. Nuseibeh, "Requirementsdriven collaborative choreography customization," in Proc. of ICSOC, ser. LNCS 5900. Springer, 2009, pp. 144-158.
    • (2009) LNCS , vol.5900 , pp. 144-158
    • Mahfouz, A.1    Barroca, L.2    Laney, R.C.3    Nuseibeh, B.4
  • 21
    • 70350222918 scopus 로고    scopus 로고
    • Commitment-based serviceoriented architecture
    • M. P. Singh, A. K. Chopra, and N. Desai, "Commitment-based serviceoriented architecture," IEEE Computer, vol. 42, no. 11, pp. 72-79, 2009.
    • (2009) IEEE Computer , vol.42 , Issue.11 , pp. 72-79
    • Singh, M.P.1    Chopra, A.K.2    Desai, N.3
  • 22
    • 2942654159 scopus 로고    scopus 로고
    • The Platform for Privacy Preferences 1.0 (P3P1.0) Specification
    • Apr. [Online]. Available
    • L. Cranor, M. Langheinrich, M. Marchiori, and J. Reagle, "The Platform for Privacy Preferences 1.0 (P3P1.0) Specification," W3C Recommendation, Apr. 2002. [Online]. Available: http://www.w3.org/TR/P3P/
    • (2002) W3C Recommendation
    • Cranor, L.1    Langheinrich, M.2    Marchiori, M.3    Reagle, J.4
  • 23
    • 33645694894 scopus 로고    scopus 로고
    • A semantic-based user privacy protection framework for web services
    • Proc. of ITWP, ser. Springer
    • A. Tumer, A. Dogac, and I. H. Toroslu, "A semantic-based user privacy protection framework for web services," in Proc. of ITWP, ser. LNCS 3169. Springer, 2005, pp. 289-305.
    • (2005) LNCS , vol.3169 , pp. 289-305
    • Tumer, A.1    Dogac, A.2    Toroslu, I.H.3
  • 25
    • 84891763439 scopus 로고    scopus 로고
    • A P3P Preference Exchange Language 1.0 (APPEL1.0)
    • Apr. [Online]. Available
    • L. Cranor, M. Langheinrich, M. Marchiori, and J. Reagle, "A P3P Preference Exchange Language 1.0 (APPEL1.0)," W3C Recommendation, Apr. 2002. [Online]. Available: http://www.w3.org/TR/P3P-preferences/
    • (2002) W3C Recommendation
    • Cranor, L.1    Langheinrich, M.2    Marchiori, M.3    Reagle, J.4
  • 26
    • 18844394838 scopus 로고    scopus 로고
    • XPref: A preference language for P3P
    • R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "XPref: a preference language for P3P," Computer Networks, vol. 48, no. 5, pp. 809-827, 2005.
    • (2005) Computer Networks , vol.48 , Issue.5 , pp. 809-827
    • Agrawal, R.1    Kiernan, J.2    Srikant, R.3    Xu, Y.4
  • 27
    • 80052754612 scopus 로고    scopus 로고
    • Quantifying privacy violations
    • Secure Data Management, ser. Springer
    • M. Banerjee, R. K. Adl, L. Wu, and K. Barker, "Quantifying privacy violations," in Secure Data Management, ser. LNCS 6933. Springer, 2011, pp. 1-17.
    • (2011) LNCS , vol.6933 , pp. 1-17
    • Banerjee, M.1    Adl, R.K.2    Wu, L.3    Barker, K.4
  • 29
    • 82555183098 scopus 로고    scopus 로고
    • Multi-criteria service recommendation based on user criteria preferences
    • ACM
    • L. Liu, N. Mehandjiev, and D.-L. Xu, "Multi-criteria service recommendation based on user criteria preferences," in Proc. of RecSys. ACM, 2011, pp. 77-84.
    • (2011) Proc. of RecSys , pp. 77-84
    • Liu, L.1    Mehandjiev, N.2    Xu, D.-L.3
  • 30
    • 73849097284 scopus 로고    scopus 로고
    • Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology
    • Advances in Intelligent Information Systems, ser. Springer
    • F. Massacci, J. Mylopoulos, and N. Zannone, "Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology," in Advances in Intelligent Information Systems, ser. Studies in Computational Intelligence. Springer, 2010, vol. 265, pp. 147-174.
    • (2010) Studies in Computational Intelligence , vol.265 , pp. 147-174
    • Massacci, F.1    Mylopoulos, J.2    Zannone, N.3
  • 31
    • 56349121964 scopus 로고    scopus 로고
    • Towards the Development of Privacy-Aware Systems
    • P. Guarda and N. Zannone, "Towards the Development of Privacy-Aware Systems," Information and Software Technology, vol. 51, no. 2, pp. 337-350, 2009.
    • (2009) Information and Software Technology , vol.51 , Issue.2 , pp. 337-350
    • Guarda, P.1    Zannone, N.2
  • 32
    • 0025700933 scopus 로고
    • How to make a decision: The Analytic Hierarchy Process
    • T. Saaty, "How to make a decision: The Analytic Hierarchy Process," EJOR, vol. 48, pp. 9-26, 1990.
    • (1990) EJOR , vol.48 , pp. 9-26
    • Saaty, T.1
  • 33
    • 55249087535 scopus 로고
    • Perceived usefulness, perceived ease of use, and user acceptance of information technology
    • Sep.
    • F. D. Davis, "Perceived usefulness, perceived ease of use, and user acceptance of information technology," MIS Q., vol. 13, no. 3, pp. 319-340, Sep. 1989.
    • (1989) MIS Q. , vol.13 , Issue.3 , pp. 319-340
    • Davis, F.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.