With the adoption to Web service technologies, more and more existing non-service-oriented software systems turn to be legacy systems. They require a service-oriented reengineerin...
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
Wireless network communities face a number of difficulties due to lack of integration between network and community resources management. In this work, we present a novel solution...
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
In SOA (Service Oriented Architecture), web service providers use service registries to publish services and requestors use registries to find them. The major current service regis...