The correct implementation of security protocols is a challenging task. To achieve a high degree of confidence in an implementation, as with any software, ideally one requires bot...
Given the large amount of existing services and the diversified needs nowadays, it is time-consuming for end-users to find appropriate services. To help end-users obtain their desi...
The Web is rapidly becoming the platform through which many companies deliver services to businesses and individual customers. E-Services are typically delivered point-to-point; h...
Web Service Technology has been developing rapidly as it provides a flexible application-to-application interaction mechanism. Several ongoing research efforts focus on various as...
We describe a methodology for assembling composite services based on three basic processes which are independent of the concrete implementation: Abstraction Process, Service Compos...