Automatic recognition of tractability in inference relations
Journal of the ACM (JACM)
So Far (Schematically) yet So Near (Semantically)
Proceedings of the IFIP WG 2.6 Database Semantics Conference on Interoperable Database Systems (DS-5)
Conversation specification: a new approach to design and analysis of e-service composition
WWW '03 Proceedings of the 12th international conference on World Wide Web
Protocol Insecurity with Finite Number of Sessions is NP-Complete
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Automatic composition of transition-based semantic web services with messaging
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Analyzing Conversations of Web Services
IEEE Internet Computing
Dynamic Web Services Provisioning with Constraints
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part I on On the Move to Meaningful Internet Systems:
Automated composition of web services by planning at the knowledge level
IJCAI'05 Proceedings of the 19th international joint conference on Artificial intelligence
ICSOC'06 Proceedings of the 4th international conference on Service-Oriented Computing
RTA'06 Proceedings of the 17th international conference on Term Rewriting and Applications
Towards the orchestration of secured services under non-disclosure policies
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
Hi-index | 0.00 |
Automatic composition of web services is a challenging task. Many works have considered simplified automata models that abstract away from the structure of messages exchanged by the services. For the domain of secured services (using e.g. digital signing or timestamping) we propose a novel approach to automated composition of services based on their security policies. Given a community of services and a goal service, we reduce the problem of composing the goal from services in the community to a security problem where an intruder should intercept and redirect messages from the service community and a client service till reaching a satisfying state. We have implemented the algorithm in AVANTSSAR Platform [5] and applied the tool to several case studies.