-
1
-
-
84863617430
-
A hybrid approach for efficient web service composition with end-to-end qos constraints
-
M. Alrifai, T. Risse, and W. Nejdl, "A hybrid approach for efficient web service composition with end-to-end qos constraints," TWEB, vol. 6, no. 2, pp. 7:1-7:31, 2012.
-
(2012)
TWEB
, vol.6
, Issue.2
-
-
Alrifai, M.1
Risse, T.2
Nejdl, W.3
-
2
-
-
33744489632
-
Fuzzy matchmaking for web services
-
IEEE
-
K.-M. Chao, M. Younas, C.-C. Lo, and T.-H. Tan, "Fuzzy matchmaking for web services," in Proc. of AINA. IEEE, 2005, pp. 721-726.
-
(2005)
Proc. of AINA
, pp. 721-726
-
-
Chao, K.-M.1
Younas, M.2
Lo, C.-C.3
Tan, T.-H.4
-
3
-
-
58749111839
-
On the functional quality of service (fqos) to discover and compose interoperable web services
-
B. Jeong, H. Cho, and C. Lee, "On the functional quality of service (fqos) to discover and compose interoperable web services," Expert Syst. Appl., vol. 36, no. 3, pp. 5411-5418, 2009.
-
(2009)
Expert Syst. Appl.
, vol.36
, Issue.3
, pp. 5411-5418
-
-
Jeong, B.1
Cho, H.2
Lee, C.3
-
4
-
-
67549130563
-
QoS Based Ranking for Web Services: Fuzzy Approaches
-
V. X. Tran and H. Tsuji, "QoS Based Ranking for Web Services: Fuzzy Approaches," in Proc. of NWeSP, 2008, pp. 77-82.
-
Proc. of NWeSP, 2008
, pp. 77-82
-
-
Tran, V.X.1
Tsuji, H.2
-
5
-
-
35148889393
-
A Fuzzy Model for Selection of QoS-Aware Web Services
-
IEEE
-
P. Wang, K.-M. Chao, C.-C. Lo, C.-L. Huang, and Y. Li, "A Fuzzy Model for Selection of QoS-Aware Web Services," in Proc. of ICEBE. IEEE, 2006, pp. 585-593.
-
(2006)
Proc. of ICEBE
, pp. 585-593
-
-
Wang, P.1
Chao, K.-M.2
Lo, C.-C.3
Huang, C.-L.4
Li, Y.5
-
6
-
-
20444480301
-
Toward autonomic web services trust and selection
-
ACM
-
E. M. Maximilien and M. P. Singh, "Toward autonomic web services trust and selection," in Proc. of SOC. ACM, 2004, pp. 212-221.
-
(2004)
Proc. of SOC
, pp. 212-221
-
-
Maximilien, E.M.1
Singh, M.P.2
-
7
-
-
70449492751
-
Integrating behavioral trust in web service compositions
-
IEEE
-
S. Paradesi, P. Doshi, and S. Swaika, "Integrating behavioral trust in web service compositions," in Proc. of ICWS. IEEE, 2009, pp. 453-460.
-
(2009)
Proc. of ICWS
, pp. 453-460
-
-
Paradesi, S.1
Doshi, P.2
Swaika, S.3
-
8
-
-
77950976694
-
A reputationbased service selection scheme
-
IEEE
-
P. Wang, K.-M. Chao, C.-C. Lo, R. Farmer, and P.-T. Kuo, "A reputationbased service selection scheme," in Proc. of ICEBE. IEEE, 2009, pp. 501-506.
-
(2009)
Proc. of ICEBE
, pp. 501-506
-
-
Wang, P.1
Chao, K.-M.2
Lo, C.-C.3
Farmer, R.4
Kuo, P.-T.5
-
9
-
-
46849122689
-
Reputation-Enhanced QoS-based Web Services Discovery
-
IEEE
-
Z. Xu, P. Martin, W. Powley, and F. Zulkernine, "Reputation-Enhanced QoS-based Web Services Discovery," in Proc. of ICWS. IEEE, 2007, pp. 249-256.
-
(2007)
Proc. of ICWS
, pp. 249-256
-
-
Xu, Z.1
Martin, P.2
Powley, W.3
Zulkernine, F.4
-
10
-
-
36049032185
-
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
-
F. Massacci, J. Mylopoulos, and N. Zannone, "Hierarchical hippocratic databases with minimal disclosure for virtual organizations," VLDB J., vol. 15, no. 4, pp. 370-387, 2006.
-
(2006)
VLDB J.
, vol.15
, Issue.4
, pp. 370-387
-
-
Massacci, F.1
Mylopoulos, J.2
Zannone, N.3
-
11
-
-
80053158921
-
A privacy-preserving approach for web service selection and provisioning
-
IEEE
-
A. Squicciarini, B. Carminati, and S. Karumanchi, "A privacy-preserving approach for web service selection and provisioning," in Proc. of ICWS. IEEE, 2011, pp. 33-40.
-
(2011)
Proc. of ICWS
, pp. 33-40
-
-
Squicciarini, A.1
Carminati, B.2
Karumanchi, S.3
-
12
-
-
80052804889
-
Privacy-Aware DaaS Services Composition
-
Database and Expert Systems Applications, ser. Springer
-
S.-E. Tbahriti, M. Mrissa, B. Medjahed, C. Ghedira, M. Barhamgi, and J. Fayn, "Privacy-Aware DaaS Services Composition," in Database and Expert Systems Applications, ser. LNCS 6860. Springer, 2011, pp. 202-216.
-
(2011)
LNCS
, vol.6860
, pp. 202-216
-
-
Tbahriti, S.-E.1
Mrissa, M.2
Medjahed, B.3
Ghedira, C.4
Barhamgi, M.5
Fayn, J.6
-
13
-
-
84862330428
-
Privacy and recovery in composite web service transactions
-
R. Hewett and P. Kijsanayothin, "Privacy and recovery in composite web service transactions," International Journal for Infonomics, vol. 3, no. 2, pp. 240-248, 2010.
-
(2010)
International Journal for Infonomics
, vol.3
, Issue.2
, pp. 240-248
-
-
Hewett, R.1
Kijsanayothin, P.2
-
14
-
-
38949158735
-
A framework for building privacy-conscious composite web services
-
IEEE
-
W. Xu, V. N. Venkatakrishnan, R. Sekar, and I. V. Ramakrishnan, "A framework for building privacy-conscious composite web services," in Proc. of ICWS. IEEE, 2006, pp. 655-662.
-
(2006)
Proc. of ICWS
, pp. 655-662
-
-
Xu, W.1
Venkatakrishnan, V.N.2
Sekar, R.3
Ramakrishnan, I.V.4
-
16
-
-
71749095793
-
Ws-engineer: A model-based approach to engineering web service compositions and choreography
-
Springer
-
H. Foster, S. Uchitel, J. Magee, and J. Kramer, "Ws-engineer: A model-based approach to engineering web service compositions and choreography," in Test and Analysis of Web Services. Springer, 2007, pp. 87-119.
-
(2007)
Test and Analysis of Web Services
, pp. 87-119
-
-
Foster, H.1
Uchitel, S.2
Magee, J.3
Kramer, J.4
-
17
-
-
4544339500
-
A Petri net-based model for web service composition
-
Australian Computer Society, Inc.
-
R. Hamadi and B. Benatallah, "A Petri net-based model for web service composition," in Proc. of ADC. Australian Computer Society, Inc., 2003, pp. 191-200.
-
(2003)
Proc. of ADC
, pp. 191-200
-
-
Hamadi, R.1
Benatallah, B.2
-
18
-
-
84959051487
-
Formal verification of e-services and workflows
-
Web Services, E-Business, and the Semantic Web, ser. Springer
-
X. Fu, T. Bultan, and J. Su, "Formal verification of e-services and workflows," in Web Services, E-Business, and the Semantic Web, ser. LNCS 2512. Springer, 2002, pp. 188-202.
-
(2002)
LNCS
, vol.2512
, pp. 188-202
-
-
Fu, X.1
Bultan, T.2
Su, J.3
-
19
-
-
20444435185
-
Synthesis of underspecified composite e-services based on automated reasoning
-
ACM
-
D. Berardi, G. D. Giacomo, M. Lenzerini, M. Mecella, and D. Calvanese, "Synthesis of underspecified composite e-services based on automated reasoning," in Proc. of SOC. ACM, 2004, pp. 105-114.
-
(2004)
Proc. of SOC
, pp. 105-114
-
-
Berardi, D.1
Giacomo, G.D.2
Lenzerini, M.3
Mecella, M.4
Calvanese, D.5
-
20
-
-
75649136935
-
Requirementsdriven collaborative choreography customization
-
Proc. of ICSOC, ser. Springer
-
A. Mahfouz, L. Barroca, R. C. Laney, and B. Nuseibeh, "Requirementsdriven collaborative choreography customization," in Proc. of ICSOC, ser. LNCS 5900. Springer, 2009, pp. 144-158.
-
(2009)
LNCS
, vol.5900
, pp. 144-158
-
-
Mahfouz, A.1
Barroca, L.2
Laney, R.C.3
Nuseibeh, B.4
-
21
-
-
70350222918
-
Commitment-based serviceoriented architecture
-
M. P. Singh, A. K. Chopra, and N. Desai, "Commitment-based serviceoriented architecture," IEEE Computer, vol. 42, no. 11, pp. 72-79, 2009.
-
(2009)
IEEE Computer
, vol.42
, Issue.11
, pp. 72-79
-
-
Singh, M.P.1
Chopra, A.K.2
Desai, N.3
-
22
-
-
2942654159
-
The Platform for Privacy Preferences 1.0 (P3P1.0) Specification
-
Apr. [Online]. Available
-
L. Cranor, M. Langheinrich, M. Marchiori, and J. Reagle, "The Platform for Privacy Preferences 1.0 (P3P1.0) Specification," W3C Recommendation, Apr. 2002. [Online]. Available: http://www.w3.org/TR/P3P/
-
(2002)
W3C Recommendation
-
-
Cranor, L.1
Langheinrich, M.2
Marchiori, M.3
Reagle, J.4
-
23
-
-
33645694894
-
A semantic-based user privacy protection framework for web services
-
Proc. of ITWP, ser. Springer
-
A. Tumer, A. Dogac, and I. H. Toroslu, "A semantic-based user privacy protection framework for web services," in Proc. of ITWP, ser. LNCS 3169. Springer, 2005, pp. 289-305.
-
(2005)
LNCS
, vol.3169
, pp. 289-305
-
-
Tumer, A.1
Dogac, A.2
Toroslu, I.H.3
-
24
-
-
80455162332
-
A server-side approach to privacy policy matching
-
A. Nyre, K. Bernsmed, S. Bo, and S. Pedersen, "A server-side approach to privacy policy matching," in Proc. of ARES, 2011, pp. 609-614.
-
Proc. of ARES, 2011
, pp. 609-614
-
-
Nyre, A.1
Bernsmed, K.2
Bo, S.3
Pedersen, S.4
-
25
-
-
84891763439
-
A P3P Preference Exchange Language 1.0 (APPEL1.0)
-
Apr. [Online]. Available
-
L. Cranor, M. Langheinrich, M. Marchiori, and J. Reagle, "A P3P Preference Exchange Language 1.0 (APPEL1.0)," W3C Recommendation, Apr. 2002. [Online]. Available: http://www.w3.org/TR/P3P-preferences/
-
(2002)
W3C Recommendation
-
-
Cranor, L.1
Langheinrich, M.2
Marchiori, M.3
Reagle, J.4
-
26
-
-
18844394838
-
XPref: A preference language for P3P
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "XPref: a preference language for P3P," Computer Networks, vol. 48, no. 5, pp. 809-827, 2005.
-
(2005)
Computer Networks
, vol.48
, Issue.5
, pp. 809-827
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
27
-
-
80052754612
-
Quantifying privacy violations
-
Secure Data Management, ser. Springer
-
M. Banerjee, R. K. Adl, L. Wu, and K. Barker, "Quantifying privacy violations," in Secure Data Management, ser. LNCS 6933. Springer, 2011, pp. 1-17.
-
(2011)
LNCS
, vol.6933
, pp. 1-17
-
-
Banerjee, M.1
Adl, R.K.2
Wu, L.3
Barker, K.4
-
29
-
-
82555183098
-
Multi-criteria service recommendation based on user criteria preferences
-
ACM
-
L. Liu, N. Mehandjiev, and D.-L. Xu, "Multi-criteria service recommendation based on user criteria preferences," in Proc. of RecSys. ACM, 2011, pp. 77-84.
-
(2011)
Proc. of RecSys
, pp. 77-84
-
-
Liu, L.1
Mehandjiev, N.2
Xu, D.-L.3
-
30
-
-
73849097284
-
Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology
-
Advances in Intelligent Information Systems, ser. Springer
-
F. Massacci, J. Mylopoulos, and N. Zannone, "Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology," in Advances in Intelligent Information Systems, ser. Studies in Computational Intelligence. Springer, 2010, vol. 265, pp. 147-174.
-
(2010)
Studies in Computational Intelligence
, vol.265
, pp. 147-174
-
-
Massacci, F.1
Mylopoulos, J.2
Zannone, N.3
-
31
-
-
56349121964
-
Towards the Development of Privacy-Aware Systems
-
P. Guarda and N. Zannone, "Towards the Development of Privacy-Aware Systems," Information and Software Technology, vol. 51, no. 2, pp. 337-350, 2009.
-
(2009)
Information and Software Technology
, vol.51
, Issue.2
, pp. 337-350
-
-
Guarda, P.1
Zannone, N.2
-
32
-
-
0025700933
-
How to make a decision: The Analytic Hierarchy Process
-
T. Saaty, "How to make a decision: The Analytic Hierarchy Process," EJOR, vol. 48, pp. 9-26, 1990.
-
(1990)
EJOR
, vol.48
, pp. 9-26
-
-
Saaty, T.1
-
33
-
-
55249087535
-
Perceived usefulness, perceived ease of use, and user acceptance of information technology
-
Sep.
-
F. D. Davis, "Perceived usefulness, perceived ease of use, and user acceptance of information technology," MIS Q., vol. 13, no. 3, pp. 319-340, Sep. 1989.
-
(1989)
MIS Q.
, vol.13
, Issue.3
, pp. 319-340
-
-
Davis, F.D.1
|