Sciweavers

2442 search results - page 36 / 489
» Secure Service Orchestration
Sort
View
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
13 years 5 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
ICPPW
2009
IEEE
14 years 2 months ago
Load Balancing Concurrent BPEL Processes by Dynamic Selection of Web Service Endpoints
Business workflows implemented as BPEL processes play an important role for many business applications. BPEL is used to orchestrate a series of Web service calls. Which provider ...
Marvin Ferber, Sascha Hunold, Thomas Rauber
SOCO
2005
Springer
14 years 1 months ago
Flexible Binding for Reusable Composition of Web Services
Abstract. In addition to publishing composite services as reusable services, compositions can also be reused by applying them to orchestrate different component services. To do so...
Cesare Pautasso, Gustavo Alonso
OTM
2004
Springer
14 years 1 months ago
Transforming UMM Business Collaboration Models to BPEL
UN/CEFACT’s Modeling Methodology (UMM) has been developed to analyze and design B2B business processes independent of the underlying exchange technology. It became the methodolog...
Birgit Hofreiter, Christian Huemer
EUROMICRO
2007
IEEE
13 years 9 months ago
Analysis of BPEL Data Dependencies
BPEL is a de-facto standard language for web service orchestration. It is a challenge to test BPEL processes automatically because of the complex features of the language. The cur...
Yongyan Zheng, Jiong Zhou, Paul Krause