Extended BPEL with heterogeneous authentication mechanisms in service ecosystems
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
Incorporating Security Requirements into Service Composition: From Modelling to Execution
ICSOC-ServiceWave '09 Proceedings of the 7th International Joint Conference on Service-Oriented Computing
Security-Aware Service Composition for End Users of Small Enterprises
Proceedings of the 2010 conference on New Trends in Software Methodologies, Tools and Techniques: Proceedings of the 9th SoMeT_10
Access control: what is required in business collaboration?
ADC '09 Proceedings of the Twentieth Australasian Conference on Australasian Database - Volume 92
A novel client-based approach for signing and checking web forms by using XML against DoS attacks
Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
Data oriented challenges of service architectures a data quality perspective
Proceedings of the 13th International Conference on Computer Systems and Technologies
Towards an approach to design and enforce security in web service composition
International Journal of Web Engineering and Technology
Configuring private data management as access restrictions: from design to enforcement
ICSOC'12 Proceedings of the 10th international conference on Service-Oriented Computing
An aspect-oriented framework for specification and enforcement of non-functional concerns in WS-BPEL
International Journal of Web and Grid Services
A methodology for analyzing and measuring semantic data quality in service oriented architectures
Proceedings of the 14th International Conference on Computer Systems and Technologies
A general approach for a trusted deployment of a business process in clouds
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems
Rule-Based Security Capabilities Matching for Web Services
Wireless Personal Communications: An International Journal
Information and Software Technology
Hi-index | 0.00 |
A Web service is a software system designed to support interoperable application-to-application interactions over the Internet. Web services are based on a set of XML standards, such as Web Services Description Language (WSDL), Simple Object Access Protocol (SOAP) and Universal Description, Discovery and Integration (UDDI). Recently, there has been a growing interest in Web service composition, and some languages (e.g., WSBPEL, BPML) for modeling the composition have been proposed. In this paper, we focus on security constraints of Web service composition, which have not been deeply investigated so far. We propose a method for modeling security constraints and a brokered architecture to build composite Web services according to the specified security constraints.