Key establishment is essential for many applications of cryptography. Its purpose is to negotiate keys for other cryptographic schemes, usually for encryption and authentication. I...
Web services are self-contained, modular units of application logic which provide business functionality to other applications via Internet connections. Several models have been u...
Discovery of Web Services (WSs) has gained great research attention due to proliferation of available WSs and the failure of the syntactic approach of UDDI. Semantic discovery mech...
Service-Oriented Architectures (SOAs) are increasingly deployed to achieve distributed systems that are modular, flexible and extensible. Designing for a SOA can be difficult, how...
David E. Millard, Hugh C. Davis, Yvonne Margaret H...
The semantic annotation of Web services capabilities with ontological information aims at providing the necessary infrastructure for facilitating efficient and accurate service di...
Execution monitoring of complex web service process models is critical for effective management and control of web services based systems. During the composite process model execu...
A major advantage offered by Web services technologies is the ability to dynamically discover and invoke services. This ability is particularly important for operations of many ap...
Arun Mukhija, Andrew Dingwall-Smith, David S. Rose...
An architecture of a hosting system is presented, where a number of servers are used to provide different types of web services to paying customers. There are charges for running ...
Recently, OASIS approved two standards respectively for Web Service composition and for Web Service transactions. Nevertheless, it is still unclear how WS-BPEL and the WS-TX famil...
For improved flexibility and concurrent usage existing transaction management models for Web services relax the isolation property of Web service-based transactions. Correctness o...
Mohammad Alrifai, Wolf-Tilo Balke, Peter Dolog, Wo...