A Decade of Model Driven Web Services Composition Frameworks
暂无分享,去创建一个
[1] David Basin,et al. Model driven security: From UML models to access control infrastructures , 2006, TSEM.
[2] Mike P. Papazoglou,et al. Service-oriented computing: concepts, characteristics and directions , 2003, Proceedings of the Fourth International Conference on Web Information Systems Engineering, 2003. WISE 2003..
[3] Antonio Bucchiarone,et al. Web Service Composition Approaches: From Industrial Standards to Formal Methods , 2007, Second International Conference on Internet and Web Applications and Services (ICIW'07).
[4] John W. Creswell,et al. Research Design: Qualitative, Quantitative, and Mixed Methods Approaches , 2010 .
[5] Mohd Fadzil Hassan,et al. SECURE BUSINESS PROCESS MODELLING OF SOA APPLICATIONS USING “ UML-SOA-SEC ” , 2012 .
[6] Remco M. Dijkman,et al. Service composition: concepts, techniques, tools and trends , 2005 .
[7] Towards Modeling Web Service Composition in UML , 2004, WSMAI.
[8] Abbas Tashakkori,et al. Mixed Methodology: Combining Qualitative and Quantitative Approaches , 1998 .
[9] Christine Nadel,et al. Case Study Research Design And Methods , 2016 .
[10] Muhammad Alam,et al. Model driven security engineering for the realization of dynamic security requirements in collaborative systems , 2006, MoDELS'06.
[11] J. Gaber,et al. Web Services Composition using UML-S: A Case Study , 2008, 2008 IEEE Globecom Workshops.
[12] Michiaki Tatsubori,et al. Methodology and Tools for End-to-End SOA Security Configurations , 2008, 2008 IEEE Congress on Services - Part I.
[13] Priya Narasimhan,et al. Dependable Service-Oriented Computing , 2009, IEEE Internet Computing.
[14] Axel Uhl,et al. Model-Driven Architecture , 2002, OOIS Workshops.
[15] Mohd Fadzil Hassan,et al. A Framework for the Model Driven Development of Secure Web Services Composition , 2012 .
[16] Mario Piattini,et al. Towards CIM to PIM Transformation: From Secure Business Processes Defined in BPMN to Use-Cases , 2007, BPM.
[17] Andreas Schaad,et al. Model-driven business process security requirement specification , 2009, J. Syst. Archit..
[18] Xie Dan,et al. An Approach for Describing SOA , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.
[19] Wil M. P. van der Aalst,et al. Web service composition languages: old wine in New bottles? , 2003, 2003 Proceedings 29th Euromicro Conference.
[20] J. Gaber,et al. Modeling and Specification of Web Services Composition Using UML-S , 2008, 2008 4th International Conference on Next Generation Web Services Practices.
[21] Jun Li,et al. Sec-MoSC Tooling - Incorporating Security Requirements into Service Composition , 2009, ICSOC/ServiceWave.
[22] C. Peltz,et al. Web Services Orchestration and Choreography , 2003, Computer.
[23] Khaled M. Khan,et al. Security-Oriented Service Composition and Evolution , 2006, 2006 13th Asia Pacific Software Engineering Conference (APSEC'06).
[24] Mike P. Papazoglou,et al. Model Driven Service Composition , 2003, ICSOC.
[25] Jun Li,et al. Incorporating Security Requirements into Service Composition: From Modelling to Execution , 2009, ICSOC/ServiceWave.
[26] A. Bucchiarone,et al. A Survey on Services Composition Languages and Models , 2006 .
[27] Soumya Simanta,et al. Common Misconceptions about Service-Oriented Architecture , 2007, 2007 Sixth International IEEE Conference on Commercial-off-the-Shelf (COTS)-Based Software Systems (ICCBSS'07).
[28] D. Skogan,et al. Web service composition in UML , 2004 .
[29] Christoph Meinel,et al. Security Requirements Specification in Service-Oriented Business Process Management , 2009, 2009 International Conference on Availability, Reliability and Security.
[30] Per Runeson,et al. Guidelines for conducting and reporting case study research in software engineering , 2009, Empirical Software Engineering.
[31] M. Beek,et al. A Survey on Service Composition Approaches : From Industrial Standards to Formal Methods ? , 2006 .
[32] Ruth Breu,et al. Security engineering for service-oriented architectures , 2008 .
[33] Donald Firesmith,et al. Engineering Security Requirements , 2003, J. Object Technol..
[34] Martin Henkel,et al. Architectures for Service-oriented Processes , 2004 .