Sciweavers

284 search results - page 35 / 57
» WSAT: A Tool for Formal Analysis of Web Services
Sort
View
CCS
2007
ACM
14 years 2 months ago
Multi-module vulnerability analysis of web-based applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...
AIME
2009
Springer
13 years 9 months ago
Semantic Web-Based Modeling of Clinical Pathways Using the UML Activity Diagrams and OWL-S
: Clinical Pathways can be viewed as workflows, comprising an ordering of activities with associated execution constraints. Workflow models allow formal representation, analysis an...
Ali Daniyal, Syed Sibte Raza Abidi
ICC
2009
IEEE
118views Communications» more  ICC 2009»
14 years 2 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
CORR
2011
Springer
164views Education» more  CORR 2011»
12 years 11 months ago
Online Strategies for Intra and Inter Provider Service Migration in Virtual Networks
Network virtualization allows one to build dynamic distributed systems in which resources can be dynamically allocated at locations where they are most useful. In order to fully e...
Dushyant Arora, Marcin Bienkowski, Anja Feldmann, ...
ISOLA
2010
Springer
13 years 6 months ago
Semantically-Guided Workflow Construction in Taverna: The SADI and BioMoby Plug-Ins
In the Taverna workflow design and enactment tool, users often find it difficult to both manually discover a service or workflow fragment that executes a desired operation on a pie...
David Withers, Edward A. Kawas, E. Luke McCarthy, ...