Sciweavers

249 search results - page 26 / 50
» Validating a Web Service Security Abstraction by Typing
Sort
View
NORDSEC
2009
Springer
14 years 2 months ago
Facilitating the Adoption of Tor by Focusing on a Promising Target Group
The technology for anonymous communication has been thoroughly researched. But despite the existence of several protection services, a business model for anonymous web surfing has ...
Heiko Roßnagel, Jan Zibuschka, Lexi Pimenidi...
BPM
2008
Springer
132views Business» more  BPM 2008»
13 years 9 months ago
On Modeling and Maximizing Business Value for Autonomic Service-Oriented Systems
Abstract. The existing Web service management solutions are almost exclusively focused on optimization of technical QoS metrics (e.g., availability). However, financial (e.g., prof...
Vladimir Tosic
WWW
2007
ACM
14 years 8 months ago
Spam double-funnel: connecting web spammers with advertisers
Spammers use questionable search engine optimization (SEO) techniques to promote their spam links into top search results. In this paper, we focus on one prevalent type of spam ? ...
Yi-Min Wang, Ming Ma, Yuan Niu, Hao Chen
WISE
2008
Springer
14 years 2 months ago
Bill Organiser Portal: A Case Study on End-User Composition
Abstract. Whilst Web services can be composed by technical developers using a language such as BPEL, there is no easy way for non-technical end users to take advantage of these ser...
Agnes Ro, Lily Shu-Yi Xia, Hye-Young Paik, Chea Hy...
ISF
2010
273views more  ISF 2010»
13 years 5 months ago
Agents of responsibility - freelance web developers in web applications development
Much of the literature on responsibility in the IT field addresses the responsibilities of members of the IT profession. In this paper, we investigate to what extent the responsibi...
Malik Aleem Ahmed, Jeroen van den Hoven