Partitioning and Cloud Deployment of Composite Web Services under Security Constraints
暂无分享,去创建一个
[1] Claude Godart,et al. Toward synchronization between decentralized orchestrations of composite web services , 2009, 2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing.
[2] Marlon Dumas,et al. Heuristics for composite Web service decentralization , 2014, Software & Systems Modeling.
[3] Gerhard Weikum,et al. The Mentor project: steps towards enterprise-wide workflow management , 1996, Proceedings of the Twelfth International Conference on Data Engineering.
[4] Gerhard J. Woeginger,et al. The Quadratic Assignment Problem with a Monotone Anti-Monge and a Symmetric Toeplitz Matrix: Easy and Hard Cases , 1996, IPCO.
[5] Angélica Caro,et al. A BPMN Extension for Including Data Quality Requirements in Business Process Modeling , 2012, BPMN.
[6] Bernd Freisleben,et al. Greedy and Local Search Heuristics for Unconstrained Binary Quadratic Programming , 2002, J. Heuristics.
[7] Marlon Dumas,et al. Optimized decentralization of composite web services , 2010, 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010).
[8] Sunil Chandra,et al. Orchestrating composite Web services under data flow constraints , 2005, IEEE International Conference on Web Services (ICWS'05).
[9] Paul Watson. A multi-level security model for partitioning workflows over federated clouds , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.
[10] Claude Godart,et al. A Flexible Approach for Automatic Process Decentralization Using Dependency Tables , 2009, 2009 IEEE International Conference on Web Services.
[11] Stefan Tai,et al. Cloud Computing - Web-Based Dynamic IT Services , 2011 .
[12] Shazia Wasim Sadiq,et al. Model Driven Distribution of Collaborative Business Processes , 2006, 2006 IEEE International Conference on Services Computing (SCC'06).
[13] David Elliott Bell,et al. Secure Computer Systems: A Mathematical Model, Volume II , 1996, J. Comput. Secur..
[14] Barbara Carminati,et al. Security Conscious Web Service Composition , 2006, 2006 IEEE International Conference on Web Services (ICWS'06).
[15] Jörg Schwenk,et al. Security Prospects through Cloud Computing by Adopting Multiple Clouds , 2011, 2011 IEEE 4th International Conference on Cloud Computing.
[16] Rafik Bouaziz,et al. Modeling Security Requirements in Service Based Business Processes , 2012, BMMDS/EMMSAD.
[17] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[18] Christoph Meinel,et al. Modelling Security Goals in Business Processes , 2008, Modellierung.
[19] Claude Godart,et al. Information Flow Control with Decentralized Service Compositions , 2007, IEEE International Conference on Web Services (ICWS 2007).
[20] Sunil Chandra,et al. Decentralized orchestration of composite web services , 2004, WWW Alt. '04.
[21] Oliver Kopp,et al. Maintaining Data Dependencies across BPEL Process Fragments , 2008, Int. J. Cooperative Inf. Syst..
[22] Jana Koehler,et al. The refined process structure tree , 2008, Data Knowl. Eng..