By Topic

International Conference on Next Generation Web Services Practices

25-28 Sept. 2006

Filter Results

Displaying Results 1 - 25 of 30
  • International Conference on Next Generation Web Services Practices - Cover

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (456 KB)
    Freely Available from IEEE
  • International Conference on Next Generation Web Services Practices-Title

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • International Conference on Next Generation Web Services Practices-Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • International Conference on Next Generation Web Services Practices - TOC

    Publication Year: 2006, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • Chairs' welcome message

    Publication Year: 2006, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (47 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organization

    Publication Year: 2006, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • A UML Simulator for Behavioral Validation of Systems Based on SOA

    Publication Year: 2006, Page(s):3 - 10
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (345 KB) | HTML iconHTML

    Recently SOA (service oriented architecture) attracts attention as a technique for effective software development. SOA based systems are commonly implemented with the combination of BPEL4WS and Web services. BPEL4WS is used for defining interaction between multiple Web services. Since semantics of SOA based systems are complex, the effective validation of those semantics is essential for effective... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Describing, Verifying and Developing Web Service Using the B-method

    Publication Year: 2006, Page(s):11 - 16
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    It is necessary to guarantee the validity of Web services and their composition. Traditional approaches transform the BPEL4WS specification into other formal models and then check them. Unfortunately, if we could not find the proper composition of services to fulfil the request but have to develop parts of services ourselves, the models used to verify are almost useless in other development steps.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GNSD: A Novel Service Discovery Mechanism for Grid Environment

    Publication Year: 2006, Page(s):17 - 26
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (287 KB) | HTML iconHTML

    Due to the highly distributed and dynamic features, service discovery is a key requirement in grid computing. The paper first introduces the existing service discovery mechanisms in distributed computing, and then points out the problems in MDS which is widely used in grid systems. In order to address these issues, GNSD, a novel service discovery mechanism is proposed, which is based on the OSPF (... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic Documentation Using Semantic Web Technologies and Social Web Services

    Publication Year: 2006, Page(s):27 - 32
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    In this paper we discuss the need to interact both desktop and Web environments for making semantic documentation and the advantages of using semantic Web technologies and social Web Services. We propose the architecture and then describe the prototype system based on the proposed architecture View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incorporating Provenance in Service Oriented Architecture

    Publication Year: 2006, Page(s):33 - 40
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB) | HTML iconHTML

    There is underlying need to support data provenance in a service-based computing environment such as grid where Web services may be automatically discovered, composed, and then consumed using innovative workflow management systems. In any scientific experiments, flow of data transformations occur producing data of added scientific value. Provenance is the documentation about such data generated by... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CQET. An Triple Facts-Based Query Engine for Processing the Ontologies

    Publication Year: 2006, Page(s):41 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (439 KB) | HTML iconHTML

    Many studies about the query languages and inference engines for processing the ontologies have been proposed. The basic ontology query languages are the RQL, RDQL, SPARQL, OWLQL, etc., and the significant inference engines are the Jena, Sesame, Jess, JTP, and so on. However, they have some limitations to process the ontologies completely. In this study, we suggest the new query engine for process... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach to Automating Transaction Management in a Data Services Platform

    Publication Year: 2006, Page(s):49 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (231 KB) | HTML iconHTML

    In today's enterprises data lies across multiple sources in custom formats, often there exists no means to access (query and update) these data sources in a common enterprise wide uniform format. The requirement has led to emergence of data services platforms that allow real time access of data from multiple data sources. These platforms provide service oriented data access interfaces to both XA c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of Dynamic Web Page Generation for Database-driven Web Sites

    Publication Year: 2006, Page(s):56 - 63
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (129 KB) | HTML iconHTML

    With the rapid growth of e-business, Web sites are increasingly relying on dynamic content generation applications to provide dynamic interaction and personalized experiences to the Web sites users. To generate such dynamic Web page for each user request requires heavy dynamic script execution due to customize and personalize information. This dynamic script execution puts heavy load on the Web se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IMK2--A Database-Centric, Web Service Based Architecture for Distributed Resource-Oriented Queries

    Publication Year: 2006, Page(s):64 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    This paper will provide a summary of the IMK and IMK2 distributed software systems developed in the frame of the CRC457 research project. CRC457 is a research project of the Chemnitz University of Technology and deals with autonomous, elementary performance units, so-called competence units, which possess the ability of dynamically organizing themselves into non-hierarchical production networks at... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Support for Mobile Grid Services Framework

    Publication Year: 2006, Page(s):75 - 82
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (315 KB) | HTML iconHTML

    This paper presents the security support for a middleware framework supporting mobile grid services. Mobile grid services, the extension of the original static grid services, are characterized by the ability of moving from nodes to nodes during execution. By combining an existing mobile agent system (JADE) and a generic grid system toolkit (Globus), the mobile grid services framework is constructe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection of Parameter Manipulation Using Global Sequence Alignment

    Publication Year: 2006, Page(s):83 - 88
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (347 KB) | HTML iconHTML

    Web application parameter contains identical structure and value. As a result, parameter features repetition of identical variable name and keyword. The characteristic of the keywords can be represented by being extracted from parameter. In order to measure the identity between two sequences, genome alignment which has been much studied in bioinformatics can be applied. We extract keyword sequence... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Access Control on the Composition of Web Services

    Publication Year: 2006, Page(s):89 - 93
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    Web services composition is the main concern of application integration and on-demand businesses. However the barriers of the security domains impede the interoperability and composition of services. In this paper, we introduce the access control model for Web service composition (ACM4WSC). Based on this model, the users can access the composite Web service without concerning the access control of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Risk Analysis and Protection for WBIS

    Publication Year: 2006, Page(s):94 - 100
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    Risk analysis and protection are very important issues in the Web based information system. This paper discusses a mechanism by which a server can determine that it is safe to execute a program come from an untrusted source. The server defines security policies and assigns them into a semantic access rule table (SART). SART is used by verify algorithm (VA) to generate a digital VA filter for the i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Drawbacks of Liao et al.'s Password Authentication Scheme

    Publication Year: 2006, Page(s):101 - 108
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (155 KB) | HTML iconHTML

    In 2006, Liao et al. proposed a new password authentication scheme over insecure networks. The primary merit of their scheme is its simplicity and practicality for implementation under insecure communication links. The current paper, however, demonstrates that Liao et al.'s scheme is vulnerable to masquerading server attacks, password guessing attacks using lost smart cards, and insider attacks. I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Constraint Satisfaction Approach to Non-functional Requirements in Adaptive Web Services

    Publication Year: 2006, Page(s):109 - 116
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (760 KB) | HTML iconHTML

    While agility is a key driver for business processes as envisaged in service oriented architecture (SOA) deployments, very little thought has been put forward in the direction of managing the non-functional requirements adaptively. Adaptive SOA and Web services require mechanisms for enabling dynamic adaptation in SOA systems with a requirement of keeping service interfaces intact, while manifesti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting QoS Based Selection in Service Oriented Architecture

    Publication Year: 2006, Page(s):117 - 126
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (571 KB) | HTML iconHTML

    The ability to gauge quality of service is critical if we are to realise the potential of the service-oriented computing paradigm. Many techniques have been proposed for calculating the quality of a service, and they do so typically by collecting quality ratings from the users of the service, then combining them in one way or another to derive the quality of the service. We argue that combining qu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Texas Library Directory Web Services Application: The Potential for Web Services to Enhance Information Access to Legacy Data

    Publication Year: 2006, Page(s):127 - 132
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    This paper presents an overview of an exploratory research project to identify, describe, and investigate the applicability of the Web services (WS) approach to access legacy data. In the Z Texas implementation component of the Library of Texas (ZLOT) project, the ZLOT technical team has implemented a multipurpose Texas library directory database (TLDD) that is used as a back-end database to suppo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying Safe Regression Test Selection Techniques to Java Web Services

    Publication Year: 2006, Page(s):133 - 142
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (209 KB) | HTML iconHTML

    Existing safe regression test selection techniques, especially the white-box testing methods, do not work with Web service applications due to the inherent distributed nature of Web service systems. In this paper, we have presented a code transformation approach to regression test selection. The transformed code forms a local Java program which simulates the functionality and behavior of the Web s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Web Services Interactions--Requirements, Challenges and Limits from the F-WebS System Perspective

    Publication Year: 2006, Page(s):143 - 148
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    At the moment a lot is happening concerning the automatic interactions between and with Web services. In this article, we will elaborate shortly on the requirements and limits that need to be taken into account when dealing with semantic Web services. We base on our rich experience drawn from the creation and maintenance of F-WebS project. Additionally, several problems and challenges relating to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.