By Topic

2011 IEEE International Conference on Web Services

4-9 July 2011

Filter Results

Displaying Results 1 - 25 of 130
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (990 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - xv
    Request permission for commercial reuse | PDF file iconPDF (162 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2011, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (129 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2011, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (34 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Applications and Industry Track Chairs

    Publication Year: 2011, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (130 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2011, Page(s):xix - xx
    Request permission for commercial reuse | PDF file iconPDF (158 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2011, Page(s):xxi - xxii
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • External Reviewers

    Publication Year: 2011, Page(s): xxiii
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • IEEE Computer Society Technical Committee on Services Computing

    Publication Year: 2011, Page(s): xxiv
    Request permission for commercial reuse | PDF file iconPDF (192 KB)
    Freely Available from IEEE
  • Differential SOAP Multicasting

    Publication Year: 2011, Page(s):1 - 8
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    SOAP has been widely adopted as a simple, robust and extensible XML-based protocol for the exchange of messages among web services. Unfortunately, SOAP communications have two major performance-related drawbacks: i) verbosity, related to XML, that leads to increased network traffic, and ii) high computational burden of XML parsing and processing, that leads to high latency. In this paper, we addre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing the Caching of Web Service Responses on Wireless Clients

    Publication Year: 2011, Page(s):9 - 16
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2204 KB) | HTML iconHTML

    Contrary to simple Web content, standard Web services do not offer their clients the possibility to use cached information without the risk that it may be out-of-date. This feature has not been worth its costs in realistic Web service usage scenarios until now. However, its absence may pose restrictions and impede possible benefits in a future scenario, where mediators are both willing and able to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Opportunistic Composition of Sequentially-Connected Services in Mobile Computing Environments

    Publication Year: 2011, Page(s):17 - 24
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (171 KB) | HTML iconHTML

    Dynamic service composition has emerged as a promising approach to build complex runtime-adaptable applications as it allows for binding service providers only shortly before service execution. However, the dynamic and ad hoc nature of mobile computing environments poses a significant challenge for dynamic service composition. In particular, the lack of central control and the potential volatility... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Defending Web Services against Denial of Service Attacks Using Client Puzzles

    Publication Year: 2011, Page(s):25 - 32
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    The interoperable and loosely-coupled web services architecture, while beneficial, can be resource-intensive, and is thus susceptible to denial of service (DoS) attacks in which an attacker can use a relatively insignificant amount of resources to exhaust the computational resources of a web service. We investigate the effectiveness of defending web services from DoS attacks using client puzzles, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Privacy-Preserving Approach for Web Service Selection and Provisioning

    Publication Year: 2011, Page(s):33 - 40
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB) | HTML iconHTML

    The growing success of WS-related technologies has resulted in a large number of providers, which implement services of varying degree of sophistication and complexity. While on the one hand the availability of a wide array of services has created a competitive and flexible market that suits well the needs of different type of users, on the other hand, it requires them to select among possibly hun... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finding K Optimal Social Trust Paths for the Selection of Trustworthy Service Providers in Complex Social Networks

    Publication Year: 2011, Page(s):41 - 48
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    In a service-oriented online social network consisting of service providers and consumers as participants, a service consumer can search trustworthy service providers via the social network between them. This requires the evaluation of the trustworthiness of a service provider along a potentially very large number of social trust paths from the service consumer to the service provider. Thus, a cha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Empirical Study on Web Service Evolution

    Publication Year: 2011, Page(s):49 - 56
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    The service-oriented architecture paradigm prescribes the development of systems through the composition of services, i.e., network-accessible components, specified by (and invoked through) their WSDL interface descriptions. Systems thus developed need to be aware of changes in, and evolve with, their constituent services. Therefore, accurate recognition of changes in the WSDL specification of a s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LoST: Local State Transfer -- An Architectural Style for the Distributed Enactment of Business Protocols

    Publication Year: 2011, Page(s):57 - 64
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    Local State Transfer (LoST) is a simple, declarative approach for enacting communication protocols. LoST is perfectly distributed and relies only upon the local knowledge of each business partner. It involves a novel treatment of the information bases of protocols, especially in terms of how their parameters are specified. As a result, LoST can capture subtle patterns of interaction that more comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Privacy-Preserving XML Transformation

    Publication Year: 2011, Page(s):65 - 72
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (287 KB) | HTML iconHTML

    In composite web services one can only either hide the identities of the participants or provide end-to-end confidentiality via encryption. For a designer of inter-organizational business processes this implies that she either needs to reveal her suppliers or force her customers to reveal their information. In this paper we present a solution to the encrypted data modification problem and reconcil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Composition of Pervasive Process Fragments

    Publication Year: 2011, Page(s):73 - 80
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1214 KB) | HTML iconHTML

    A critical aspect for pervasive computing is the possibility to discover and use process knowledge at run time depending on the specific context. This can be achieved by using an underlying service-based application and exploiting its features in terms of dynamic service discovery, selection, and composition. Pervasive process fragments represent a service-based tool that allows to model incomplet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Web Service Composition with a Heuristic-Based Search Algorithm

    Publication Year: 2011, Page(s):81 - 88
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    Service Oriented Architectures and web service technology are becoming popular in recent years. As more web services can be used over the Internet, the need to find efficient algorithms for web services composition that can deal with large amounts of services becomes important. These algorithms must deal with different issues like performance, semantics or user restrictions. In this paper we prese... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS-Aware Automatic Service Composition by Applying Functional Clustering

    Publication Year: 2011, Page(s):89 - 96
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (371 KB) | HTML iconHTML

    With the steadily growing number of service providers the competition becomes more and more intense. In order to find a distinctive edge over other competitors, automatic service composition can be applied to further adapt to the requirements of the users. Most of the current composition approaches can be categorized as either planning or selection algorithms. The former automatically create workf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service Selection with Combinational Use of Functionally-Equivalent Services

    Publication Year: 2011, Page(s):97 - 104
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB) | HTML iconHTML

    Due to the increase in Web services, many recent studies have been addressing the service selection problem based on non-functional or quality aspects. Our study incorporates combinational use of functionally-equivalent services into the problem to compose an application of higher quality or with additional value. However, when such combinational use is introduced, computational cost for the servi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.