By Topic

2010 Eighth IEEE European Conference on Web Services

1-3 Dec. 2010

Filter Results

Displaying Results 1 - 25 of 36
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (539 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (150 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2010, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (119 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2010, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2010, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • Privacy Model and Annotation for DaaS

    Publication Year: 2010, Page(s):3 - 10
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (836 KB) | HTML iconHTML

    Data as a Service (DaaS) builds on service-oriented technologies to enable fast access to data resources on the Web. However, this paradigm raises several new concerns that traditional privacy models for Web services do not handle. First, the distinction between the roles of service providers and data providers is unclear, leaving the latter helpless for specifying and verifying the enforcement of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Server-Side Streaming Processing of Secured MTOM Attachments

    Publication Year: 2010, Page(s):11 - 18
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (729 KB) | HTML iconHTML

    The W3C recommendation MTOM is the defac to standard for transferring binary data in SOAP protocol elements as attachments. The distinguished feature provided by MTOM is-compared to other SOAP attachment specifications-the efficient transfer of binary data without breaking the XML info set. This property allows e.g. the application of XML Security mechanisms to the SOAP message including the attac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • License4Grid: Adopting DRM for Licensed Content in Grid Environments

    Publication Year: 2010, Page(s):19 - 26
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (211 KB) | HTML iconHTML

    Processing of licensed content with automatic compliance checking of the license terms is currently not supported in Grid environments. However, applications processing large amounts of data is a topic recently gaining more and more attention. The use of high performance computing capabilities, e.g., provided by Grid environments, is an obvious choice to speed up the processing time. Currently, mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social Formation and Interactions in Evolving Service-Oriented Communities

    Publication Year: 2010, Page(s):27 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB) | HTML iconHTML

    The global scale and distribution of companies have changed the economy and dynamics of businesses. Web-based collaborations and cross-organizational processes typically require dynamic and context-based interactions between people and services. However, finding the right partner to work on joint tasks or to solve emerging problems in such scenarios is challenging due to scale (number of involved ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Business Processes in Service-Oriented Architectures -- A Requirements Analysis

    Publication Year: 2010, Page(s):35 - 42
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    Business-process-management systems are increasingly used in service-oriented architectures (SOA), coordinating activities of loosely coupled information systems, of web services, and of human actors. This often requires exchanging and processing sensitive, personally-identifiable information, e.g., in e-employability and e-health applications. Supporting security in such a service-oriented enviro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transformation and Aggregation of Web Service Security Requirements

    Publication Year: 2010, Page(s):43 - 50
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1868 KB) | HTML iconHTML

    Service-oriented Architectures support the provision, discovery, and usage of services in different application contexts. The Web Service specifications provide a technical foundation to implement this paradigm and provide mechanisms to face the new security challenges raised by SOA. To enable the seamless usage of services, security requirements can be expressed as security policies (e.g. WS-Poli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DISC-SeT: Handling Temporal and Security Aspects in the Web Services Composition

    Publication Year: 2010, Page(s):51 - 58
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    In this paper we propose the DISC-SeT framework to handle the representation, solution computation and verification of temporal and security requirements in the services composition. The proposed approach provides a flexible event calculus based composition design, that allows for modeling different temporal (response time, time-units and other) and security aspects (access control, confidentialit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automating Composite SLA Management Tasks by Exploiting Service Dependency Information

    Publication Year: 2010, Page(s):59 - 66
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (868 KB) | HTML iconHTML

    According to the Internet of Services vision, composite services are created by composing services to complex business processes. The relationships between services in a composition are defined by Service Level Agreements (SLAs). Managing composite SLAs is a complex task which is currently performed manually. In this paper we present an approach for automating the management of composite SLAs by e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS-Aware Service Composition: A Survey

    Publication Year: 2010, Page(s):67 - 74
    Cited by:  Papers (51)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    Service compositions build new services by orchestrating a set of existing services. In the Internet of Services there may be many functional similar services, but with different Quality of Service (QoS). Thus a significant research problem in service compositions is how to select the composition's composite services that the overall QoS of the composition is being maximized. This paper summarizes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating the QoS Impact of Web Service Anonymity

    Publication Year: 2010, Page(s):75 - 82
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (187 KB) | HTML iconHTML

    Web services enable the collaboration across organizational boundaries and, thus, are a powerful technology for implementing global Service-oriented Architectures, i.e., the Internet of Services. Despite typical security mechanisms such as message encryption, attackers can create detailed profiles of service consumers, providers, and market places by merely monitoring communication endpoints. In a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining Object-Oriented Design and SOA with Remote Objects over Web Services

    Publication Year: 2010, Page(s):83 - 90
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (967 KB) | HTML iconHTML

    Current approaches of accessing stateful resources via SOAP Web services do not provide a standardized way to use program objects (classes). In this article, we show how the interface of an object-oriented class can be expressed using WSDL. This approach enables a program object to be used in a distributed environment by accessing its Web service interface. The set of Web services associated with ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feature-Based Discovery of Services with Adaptable Behaviour

    Publication Year: 2010, Page(s):91 - 98
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    Service discovery is one of the corner stones of Service-Oriented Architectures. It aims at finding the set of services which comply with a query in a scalable way with regard to the number of services in the registry. Current approaches to service discovery are based on registries (like UDDI) which provide efficient search algorithms over the interfaces (described in WSDL) and metadata of the ser... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Locating Software Features in a SOA Composite Application

    Publication Year: 2010, Page(s):99 - 106
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2863 KB) | HTML iconHTML

    This paper describes the use of Feature Sequence Viewer (FSV) to perform feature location in a teaching and research program suite named Open SOALab. In this context, a software feature refers to software components that provide specific functionality. The composite application encompasses a system in which hotel brokers identify rooms meeting various criteria from among several hotel chains in mu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigating Web APIs on the World Wide Web

    Publication Year: 2010, Page(s):107 - 114
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    The world of services on the Web, thus far limited to "classical" Web services based on WSDL and SOAP, has been increasingly marked by the domination of Web APIs, characterised by their relative simplicity and their natural suitability for the Web. Currently, the development of Web APIs is rather autonomous, guided by no established standards or rules, and Web API documentation is commonly not bas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Swapping Out Coordination of Web Processes to the Web Browser

    Publication Year: 2010, Page(s):115 - 122
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB) | HTML iconHTML

    Consumption of (business) processes provided in form of Web sites have become a part of our daily life for attending our personal and business needs. In order to obtain the best solution for a particular task, users often combine several Web processes. However, the coordination of the execution of such Web process compositions is completely manual demanding the user to enter same or logical depend... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service Composition for Non-programmers: Prospects, Problems, and Design Recommendations

    Publication Year: 2010, Page(s):123 - 130
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (575 KB) | HTML iconHTML

    Although Service Oriented Architecture technologies are becoming widespread, user research to support the exploitation and composition of services by non-programmers is still in its infancy. This paper presents three user studies conducted during the user-centered design of the Serv Face Builder, a service composition tool for non-programmers. Results suggest that end users do not realize that ser... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assisted Service Composition for End Users

    Publication Year: 2010, Page(s):131 - 138
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (443 KB) | HTML iconHTML

    Involving people who do not have programming background in assembling and tailoring service-based applications promises to open up access to the creativity of millions of users. An increasing number of development environments aim to do this by offering drag-and-drop visual representations connecting different service components into an assembly. In contrast to the majority of these, we did not st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.