The raising need for e-government applications leads to many new approaches in this sector. To fulfill the requirement for a flexible government-to-government (G2G) software sys...
This paper extends the work described in “An Approach to the Formalisation of a Certification Policy”, 7th International Symposium on System and Information Security (SSI 2005...
Web Services offer great promise for integrating and automating software applications within and between enterprises over the Internet. However, ensuring that Web Services are dep...
Louise E. Moser, P. M. Melliar-Smith, Wenbing Zhao
Discovery of service providers that are useful to service requesters is a common problem in large, dynamic serviceoriented systems, such as Grids. Simple service indices do not ad...
— Service Oriented Architectures with underlying technologies like web services and web services orchestration have opened the door to a wide range of novel application scenarios...
Nowadays, most important topic about internet banking is security. Banks’ basic concern is ensuring their customers’ electronic transactions. Nevertheless, fraudsters are beco...
We present a novel approach for the implementation of efficient and dependable web service engines (WSEs). A WSE instance represents a single node in a distributed network of par...
An attack mutation algorithm takes a known instance of an attack and transforms it into many distinct instances by repeatedly applying attack transformations. Such algorithms are ...
Abstract. Interactive programs allow users to engage in input and output throughout execution. The ubiquity of such programs motivates the development of models for reasoning about...
Kevin R. O'Neill, Michael R. Clarkson, Stephen Cho...