5-10 July 2010

Filter Results

Displaying Results 1 - 25 of 133
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (8 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (51 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (134 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - xv
    Request permission for commercial reuse | PDF file iconPDF (227 KB)
    Freely Available from IEEE
  • Message from the General Chair and Program Co-Chairs

    Publication Year: 2010, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (109 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Workshop Co-Chairs

    Publication Year: 2010, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (118 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010, Page(s):xviii - xix
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • Technical Steering and Program Committees

    Publication Year: 2010, Page(s):xx - xxi
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Acknowledgment of Conference Helpers

    Publication Year: 2010, Page(s): xxii
    Request permission for commercial reuse | PDF file iconPDF (123 KB) | HTML iconHTML
    Freely Available from IEEE
  • IEEE Computer Society Technical Committee on Services Computing

    Publication Year: 2010, Page(s): xxiii
    Request permission for commercial reuse | PDF file iconPDF (185 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2010, Page(s):xxiv - xxvii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB)

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Panels

    Publication Year: 2010, Page(s):xxviii - xxx
    Request permission for commercial reuse | PDF file iconPDF (154 KB)
    Freely Available from IEEE
  • Tutorials

    Publication Year: 2010, Page(s):xxxi - xxxvii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (202 KB)

    Provides an abstract for each of the presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enabling Integrated Information Framework as Cloud Services for Chemical and Petroleum Industry

    Publication Year: 2010, Page(s):1 - 7
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (761 KB) | HTML iconHTML

    Business agility is of vital importance to chemical and petroleum industry, especially in rapid response to diagnose and exchange of real-time information and other relevant data sources. From IT perspective, emerging delivery models such as cloud computing offer the possibility to build the elastic infrastructure and flexible computing platform, thus enable enterprises to focus on their core comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service Storm: A Self-Service Telecommunication Service Delivery Platform with Platform-as-a-Service Technology

    Publication Year: 2010, Page(s):8 - 15
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB) | HTML iconHTML

    To attract and serve an expanded customer base, telecommunication service providers need to provide more targeted, focused and personalized services, which brings challenges to both business model and technologies to development of value added services. In this paper, we introduce Service Storm, a novel self-service telecommunication Service Delivery Platform with Platform-as-a-Service technologie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the Usability of HL7 Information Models by Automatic Filtering

    Publication Year: 2010, Page(s):16 - 23
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (681 KB) | HTML iconHTML

    The amount of knowledge represented in the Health Level 7 International (HL7) information models is very large. The sheer size of those models makes them very useful for the communities for which they are developed. However, the size of the models and their overall organization makes it difficult to manually extract knowledge from them. We propose to extract that knowledge by using a novel filteri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach to Dynamic Provisioning of Social and Computational Services

    Publication Year: 2010, Page(s):24 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1131 KB) | HTML iconHTML

    Service-Oriented Computing (SOC) builds upon the intuitive notion of service already known and used in our society for a long time. SOC-related approaches are based on computer-executable functional units that often represent automation of services that exist at the social level, i.e., services at the level of human or organizational interactions. With the increasing adoption of SOC, more complex ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Service Oriented E-Research Platform for Ocean Knowledge Management

    Publication Year: 2010, Page(s):32 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1838 KB) | HTML iconHTML

    We present an E-Research platform for studying the impact of changes in the ecosystem on oceans and marine life. We have developed the Platform for Ocean Knowledge Management (POKM) that offers a suite of services for researchers to (a) access, share, integrate and operationalize the data, models and knowledge resources available at multiple sites; (b) collaborate in joint scientific research expe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Transparent Approach of Enabling SaaS Multi-tenancy in the Cloud

    Publication Year: 2010, Page(s):40 - 47
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (673 KB) | HTML iconHTML

    It has become more and more obvious that in Cloud Computing, applications are key drivers to make Cloud business a success. Multi-tenancy is a critical technology to allow one instance of application serving multiple customers at the same time to share Cloud resources and achieve high operational efficiency. There are different options of realizing multi-tenancy, in this paper we describe a transp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Engineering Approach to Support Software Security

    Publication Year: 2010, Page(s):48 - 55
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    As information security and privacy become increasingly important to organizations, the demand grows for software development processes that assure information integrity, availability, and confidentiality. Unfortunately, despite the investments made in process improvement, there is still no guarantee that the developed software products are protected from attacks or do not present security vulnera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MAuth: A Fine-Grained and User-centric Permission Delegation Framework for Multi-mashup Web Services

    Publication Year: 2010, Page(s):56 - 63
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (667 KB) | HTML iconHTML

    Mashups are a new breed of interactive web applications that aggregate and stitch together data retrieved from one or more sources to create an entirely new and innovative set of services. The paradigm is not limited to social networks and many enterprises are redesigning their business processes to create interactive systems in the form of mashups. However, protecting users' private data from una... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Value Added Privacy Services for Healthcare Data

    Publication Year: 2010, Page(s):64 - 71
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB) | HTML iconHTML

    The widespread use of digital data, storage and sharing for data mining has given data snoopers a big opportunity to collect and match records from multiple sources for identity theft and other privacy-invasion activities. While most healthcare organizations do a good job in protecting their data in their databases, very few organizations take enough precautions to protect data that is shared with... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Reference Model for Master of Science Program in Services Computing

    Publication Year: 2010, Page(s):72 - 79
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    Services Computing has become an increasingly important area in the IT and business sectors. In particular, Services now account for more than half of the economy in the United States and other countries. Numerous Services Computing-related degree programs and accreditation processes are being created. However, very few systematic guidelines exist for building graduate programs for Services Comput... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Case Study: Master of Science in Service Computing (Msc SC)

    Publication Year: 2010, Page(s):80 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    Service computing has become a very promising area of research and development for business-to-business integration, enterprise service migration and communication on the Internet. It provides the potential of communicating businesses online, and expands to become a large scale organization. Service market is growing continuously and need for service innovation is associated with demands for servi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.