Sciweavers

611 search results - page 13 / 123
» Security Issues in Service Composition
Sort
View
CCGRID
2007
IEEE
14 years 1 months ago
A Semantic Approach to Enhance Service Composition in Workflows that use Mobile Services
The successful execution of workflows using mobile services is dependant on the services behaving as expected. The management of this behaviour in Akogrimo is achieved by a contex...
Robert B. Piotter, Tom Kirkham, Julian R. Gallop, ...
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
13 years 4 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
TSC
2008
209views more  TSC 2008»
13 years 7 months ago
Effective Web Service Composition in Diverse and Large-Scale Service Networks
Web services are considered to be a potential silver bullet for the envisioned Service Oriented Architecture, in which loosely coupled software components are published, located, a...
Seog-Chan Oh, Dongwon Lee, Soundar R. T. Kumara
ICSOC
2010
Springer
13 years 6 months ago
Adaptive Management of Composite Services under Percentile-Based Service Level Agreements
We present a brokering service for the adaptive management of composite services. The goal of this broker is to dynamically adapt at runtime the composite service configuration, ...
Valeria Cardellini, Emiliano Casalicchio, Vincenzo...
CSE
2009
IEEE
14 years 2 months ago
Solutions to Security and Privacy Issues in Mobile Social Networking
—Social network information is now being used in ways for which it may have not been originally intended. In particular, increased use of smartphones capable of running applicati...
Aaron Beach, Mike Gartrell, Richard Han