LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Nurse, Jason R. C.
Languages: English
Types: Doctoral thesis
Subjects: QA76
Security within the Web services technology field is a complex and very\ud topical issue. When considering using this technology suite to support interacting\ud e-businesses, literature has shown that the challenge of achieving security\ud becomes even more elusive. This is particularly true with regard to attaining a\ud level of security beyond just applying technologies, that is trusted, endorsed and\ud practiced by all parties involved. Attempting to address these problems, this research\ud proposes BOF4WSS, a Business-Oriented Framework for enhancing Web\ud Services Security in e-business. The novelty and importance of BOF4WSS is its\ud emphasis on a tool-supported development methodology, in which collaborating\ud e-businesses could achieve an enhanced and more comprehensive security and\ud trust solution for their services interactions.\ud This investigation began with an in-depth assessment of the literature in\ud Web services, e-business, and their security. The outstanding issues identified\ud paved the way for the creation of BOF4WSS. With appreciation of research limitations\ud and the added value of framework tool-support, emphasis was then shifted\ud to the provision of a novel solution model and tool to aid companies in the use and\ud application of BOF4WSS. This support was targeted at significantly easing the\ud difficulties incurred by businesses in transitioning between two crucial framework\ud phases.\ud To evaluate BOF4WSS and its supporting model and tool, a two-step\ud approach was adopted. First, the solution model and tool were tested for compatibility\ud with existing security approaches which they would need to work with\ud in real-world scenarios. Second, the framework and tool were evaluated using interviews\ud with industry-based security professionals who are experts in this field.\ud The results of both these evaluations indicated a noteworthy degree of evidence\ud to affirm the suitability and strength of the framework, model and tool. Additionally,\ud these results also act to cement this thesis' proposals as innovative and\ud significant contributions to the research field.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [63] H. Foster. WS-Engineer 2008: A service architecture, behaviour and deployment veri cation platform. In A. Bouguettaya, I. Krueger, and T. Margaria, editors, Service-Oriented Computing ICSOC 2008, volume 5364 of Lecture Notes in Computer Science, pages 728{729. Springer, Heidelberg, 2008. (Cited on page 64.)
    • [64] Y.-P. Fu, K.-J. Farn, and C.-H. Yang. CORAS for the research of ISAC. In International Conference on Convergence and Hybrid Information Technology, pages 250{256, 2008. (Cited on page 207.)
    • [65] D. Z. Garcia and M. B. Felgar de Toledo. A policy-based web service infrastructure for autonomic service integration. In First Latin American Autonomic Computing Symposium (LAACS), Campo Grande, MS, 2006. (Cited on page 72.)
    • [66] D. Z. Garcia and M. B. Felgar de Toledo. A policy approach supporting web service-based business processes. In First Brazilian Workshop on Business Process Management (WBPM 2007), Gramado, RS, Brazil, 2007. (Cited on pages 66 and 113.)
    • [67] M. Gerber and R. von Solms. From risk analysis to security requirements. Computers & Security, 20(7):577{584, 2001. (Cited on pages 143, 145 and 147.)
    • [68] C. Geuer-Pollmann and J. Claessens. Web services and web service security standards. Information Security Technical Report, 10(1):15{24, 2005. (Cited on page 28.)
    • [69] G. M. Giaglis. A taxonomy of business process modeling and information systems modeling techniques. International Journal of Flexible Manufacturing Systems, 13(2):209{228, 2001. (Cited on pages 55 and 56.)
    • [70] Global Grid Forum. The Open Grid Services Architecture, Version 1.0, 2005. http://www.gridforum.org/documents/GWD-I-E/GFDI.030.pdf (Accessed 21 August 2010). (Cited on page 14.)
    • [71] F. Goethals, J. Vandenbulcke, W. Lemahieu, and M. Snoeck. Di erent types of business-to-business integration: Extended enterprise integration vs. market B2B integration. In I. Lee, editor, E-Business Innovation and Process Management, pages 1{17. CyberTech Publishing, Hershey, PA, 2007. (Cited on pages 12, 17 and 234.)
    • [72] B. A. Gran, R. Fredriksen, and A. P.-J. Thunem. An approach for modelbased risk assessment. In M. Heisel, P. Liggesmeyer, and S. Wittmann, editors, Computer Safety, Reliability, and Security (Proceedings of 23rd International Conference, SAFECOMP 2004, Potsdam, Germany, September 21-24, 2004), volume 3219 of Lecture Notes in Computer Science, pages 311{324. Springer Berlin, Heidelberg, 2004. (Cited on pages 152 and 199.)
    • [73] T. Grandison. Conceptions of trust: De nition, constructs, and models. In R. Song, L. Korba, and G. Yee, editors, Trust in E-services: Technologies, Practices and Challenges, pages 1{28. Idea Group Publishing, Hershey, PA, 2007. (Cited on page 35.)
    • [74] C. Gutierrez, E. Fernandez-Medina, and M. Piattini. Web services enterprise security architecture: a case study. In Workshop on Secure Web Services (SWS), pages 10{19, Fairfax, VA, 2005. (Cited on pages 1, 17, 30, 32 and 279.)
    • [75] C. Gutierrez, E. Fernandez-Medina, and M. Piattini. PWSSec: Process for web services security. In IEEE International Conference on Web Services, pages 213{222, Chicago, IL, 2006. (Cited on pages 30, 32, 33, 74, 75 and 279.)
    • [76] C. B. Haley, J. D. Mo ett, R. Laney, and B. Nuseibeh. A framework for security requirements engineering. In International Workshop on Software Engineering for Secure Systems, pages 35{42, Shanghai, China, 2006. ACM. (Cited on page 143.)
    • [77] B. Hartman, D. J. Flinn, K. Beznosov, and S. Kawamoto. Mastering Web Services Security. Wiley, Indianapolis, 2003. (Cited on pages 2, 24, 32 and 33.)
    • [78] F. Hartman and R. A. Ashra . Project management in the information systems and information technologies industries. Project Management Journal, 33(3):5{15, 2002. (Cited on page 44.)
    • [79] P. Hernacki and R. Pruett. Solving the supply chain puzzle. Business Integration Journal, pages 34{38, 2003. (Cited on page 12.)
    • [80] L. Hines, S. Baldwin, M. Giles, and J. Peralta. plementing agile development in a waterfall project, http://www.ibm.com/developerworks/websphere/techjournal/ 0907 hines/0907 hines.html (Accessed 21 August 2010). page 278.)
    • [82] K. Hogg, P. Chilcott, M. Nolan, and B. Srinivasan. An evaluation of web services in the design of a b2b application. In 27th Australasian Computer Science Conference, volume 26, pages 331{340, Dunedin, New Zealand, 2004. (Cited on pages 13 and 17.)
    • [83] I. Hogganvik and K. St len. Risk analysis terminology for IT-systems: Does it match intuition? In 4th International Symposium on Empirical Software Engineering, pages 13{23, 2005. (Cited on page 148.)
    • [84] S. H. Houmb and G. Georg. The aspect-oriented risk-driven development (AORDD) framework. In International Conference on Software Development (SWDC-REX), pages 81{91, Reykjavik, Iceland, 2005. (Cited on pages 150, 153, 154 and 155.)
    • [85] T. Humphreys, M. De-Soete, and C. J. Mitchell. Securing e-business. ISO Focus, 1(1):30{32, January 2004. (Cited on page 19.)
    • [86] innoQ. Web services standards overview, http://www.innoq.com/resources/ws-standards-poster/ (Accessed August 2010). (Cited on pages 68, 69 and 114.) [92] M. Jensen, N. Gruschka, R. Herkenhoner, and N. Luttenberger. SOA and web services: New technologies, new standards { new attacks. In The Fifth European Conference on Web Services, pages 35{44, Halle (Saale), Germany, 2007. (Cited on pages 1, 24 and 70.)
    • [94] A. Jones and D. Ashenden. Risk Management for Computer Security: Protecting Your Network & Information Assets. Elsevier ButterworthHeinemann, Amsterdam, Netherlands, 2005. (Cited on pages 144, 156 and 158.)
    • [95] S. Jones, M. Wilikens, and M. Masera. Trust requirements in e-business. Communications of the ACM, 43(12):81{87, 2000. (Cited on page 11.)
    • [96] J. Jurjens. Secure Systems Development with UML. Springer-Verlag, Berlin, 2005. (Cited on page 68.)
    • [97] S. Kairab. A Practical Guide to Security Assessment. Auerbach Publications, Boca Raton, FL, 2005. (Cited on pages 148 and 157.)
    • [98] J. Kajava, J. Anttila, R. Varonen, R. Savola, and J. Roning. Information security standards and global business. In IEEE International Conference on Industrial Technology (ICIT), pages 2091{2095, 2006. (Cited on page 127.)
    • [99] B. Karabacak and I. Sogukpinar. ISRAM: information security risk analysis method. Computers & Security, 24(2):147{159, 2005. (Cited on pages 47 and 145.)
    • [100] S. K. Katsikas, J. Lopez, and G. Pernul. Trust, privacy and security in e-business: Requirements and solutions. In P. Bozanis and E. N. Houstis, editors, Advances in Informatics, volume 3746 of Lecture Notes in Computer Science, pages 548{558. Springer, Heidelberg, 2005. (Cited on pages 21 and 22.)
    • [101] P. Keen, C. Ballance, S. Chan, and S. Schrump. Electronic Commerce Relationships : Trust By Design. Prentice Hall PTR, Upper Saddle River, NJ, 2000. (Cited on page 35.)
    • [102] A. Keller and H. Ludwig. The WSLA framework: Specifying and monitoring service level agreements for web services. Journal of Network and Systems Management, 11(1):57{81, 2003. (Cited on page 72.)
    • [103] M. Khalifa and J. M. Verner. Drivers for software development method usage. IEEE Transactions on Engineering Management, 47(3):360{369, 2000. (Cited on pages 40 and 41.)
    • [104] B. King and K. Reinold. Finding the Concept, Not Just the Word: A Librarian's Guide to Ontologies and Semantics. Chandos, Oxford, 2008. (Cited on pages 143 and 155.)
    • [105] C. R. Kothari. Research Methodology: Methods And Techniques. New Age International, Boston, second edition, 2008. (Cited on page 5.)
    • [106] D. J. Landoll. The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments. Auerbach Publications, Boca Raton, FL, 2006. (Cited on pages 145, 147, 148, 155, 156 and 158.)
    • [107] K. C. Laudon and C. G. Traver. E-commerce: Business, Technology, Society. Prentice Hall, New Jersey, third edition, 2007. (Cited on pages vii, 11, 12, 22 and 30.)
    • [108] K. C. Laudon and C. G. Traver. E-commerce: Business, Technology, Society. Prentice Hall, fth edition, 2008. (Cited on pages 1, 11, 12 and 20.)
    • [109] J. Liberty and D. Hurwitz. Programming .NET Windows Applications. O'Reilly, Farnham, 2003. (Cited on page 174.)
    • [111] S. Lichtenstein. Developing internet security policy for organizations. In 30th Hawaii International Conference on System Sciences, volume 4, pages 350{357, Wailea, HI, 1997. (Cited on page 31.)
    • [112] T. Lodderstedt, D. A. Basin, and J. Doser. SecureUML: A UML-based modeling language for model-driven security. In J.-M. Jezequel, H. Hussmann, and S. Cook, editors, UML 2002: The Uni ed Modeling Language, volume 2460 of Lecture Notes in Computer Science, pages 426{441. Springer, Heidelberg, 2002. (Cited on page 68.)
    • [113] K. Lunn. Software development with UML. Palgrave Macmillan, Basingstoke, 2003. (Cited on page 166.)
    • [117] P. Mayer, A. Schroeder, and N. Koch. A model-driven approach to service orchestration. In IEEE International Conference on Services Computing, pages 533{536, Honolulu, Hawaii, 2008. IEEE Computer Society. (Cited on page 55.)
    • [118] J. Meier, A. Mackman, M. Dunner, S. Vasireddy, R. Escamilla, and A. Murukan. Improving web application security: Threat modeling (Microsoft Corporation). http://msdn.microsoft.com/en-us/library/aa302419.aspx (Accessed 21 August 2010), 2003. (Cited on page 148.)
    • [119] M. J. Meixell. Quantifying the value of web services in supplier networks. Industrial Management & Data Systems, 106(3):407{422, 2006. (Cited on page 17.)
    • [120] D. A. Menasce and V. Almeida. Scaling for E-Business: Technologies, Models, Performance, and Capacity Planning. Prentice Hall PTR, London, 2000. (Cited on page 11.)
    • [121] J. Mendling and M. Hafner. From WS-CDL choreography to BPEL process orchestration. Journal of Enterprise Information Management, 21(5):525{ 542, 2008. (Cited on page 64.)
    • [122] Z. Mi, C. Zunping, M. Ziji, and Z. Binyu. A security model design in web service environment. In Fifth International Conference on Computer and Information Technology (CIT'2005), pages 736{740, Shanghai, China, 2005. (Cited on page 23.) phy (SECRYPT 2006), pages 459{464, Setubal, Portugal, 2006. INSTICC Press. (Cited on pages 11 and 20.)
    • [133] J. D. Naumann and A. M. Jenkins. Prototyping: The new paradigm for systems development. MIS Quarterly, 6(3):29{44, 1982. (Cited on page 41.)
    • [135] R. C. Newman. Cybercrime, identity theft, and fraud: Practicing safe internet - network security threats and vulnerabilities. In The 3rd Annual Conference on Information Security Curriculum Development (InfoSecCD Conference'06), pages 68{78, Kennesaw, Georgia, 2006. (Cited on page 19.)
    • [136] H. R. M. Nezhad, H. Skogsrud, B. Benatallah, and F. Casati. Securing service-based interactions: Issues and directions, 2005. http://dsonline.computer.org/WAS (Accessed 21 August 2010). (Cited on page 26.)
    • [137] J. R. Nurse. Enhancing web services security for e-business using crossenterprise policies. Master's thesis, University of Hull, UK, 2006. (Cited on pages vii, 33, 34, 50 and 85.)
    • [138] J. R. Nurse and J. E. Sinclair. BOF4WSS: A Business-Oriented Framework for Enhancing Web Services Security for e-Business. In 4th International Conference on Internet and Web Applications and Services (ICIW) 2009, pages 286{291. IEEE Computer Society, 2009. (Cited on page xi.)
    • [139] J. R. Nurse and J. E. Sinclair. Securing e-businesses that use web services | a guided tour through BOF4WSS. International Journal On Advances in Internet Technology, 2(4):253{276, 2009. (Cited on page xi.) W. Abramowicz, editor, Business Information Systems, volume 21 of Lecture Notes in Business Information Processing, pages 61{72. Springer, Heidelberg, 2009. (Cited on page xi.)
    • [141] J. R. Nurse and J. E. Sinclair. A case study analysis of an e-business security negotiations support tool. In Electrical Engineering and Applied Computing, Lecture Notes in Electrical Engineering. Springer, 2010. (Cited on page xi.)
    • [142] J. R. Nurse and J. E. Sinclair. Evaluating the compatibility of a tool to support e-businesses' security negotiations. In The International Conference of Information Security and Internet Engineering (ICISIE), under World Congress on Engineering (WCE) 2010, volume 1, pages 438{443. Newswood Limited, International Association of Engineers, 2010. (Cited on page xi.)
    • [143] J. R. Nurse and J. E. Sinclair. An evaluation of BOF4WSS and the security negotiations model and tool used to support it. International Journal On Advances in Security, 3(3), 2010. (Cited on page xi.)
    • [144] J. R. Nurse and J. E. Sinclair. A solution model and tool for supporting the negotiation of security decisions in e-business collaborations. In 5th International Conference on Internet and Web Applications and Services (ICIW) 2010, pages 13{18. IEEE Computer Society, 2010. (Cited on page xi.)
    • [145] J. R. Nurse and J. E. Sinclair. A thorough evaluation of the compatibility of an e-business security negotiations support tool. International Journal of Computer Science, 37, 2010. (Cited on page xi.) http://www.omg.org/cgi-bin/doc?formal/08-04-05.pdf (Accessed 21 August 2010). (Cited on pages 56, 66, 68 and 75.)
    • [155] S. Padmanabhuni and H. Adarkar. Security in service oriented architecture: Issues, standards and implementations. In P. Periorellis, editor, Securing Web Services: Practical Usage of Standards and Speci cations, pages 1{21. Information Science Reference, Hershey, PA, 2008. (Cited on pages 14, 21, 23, 25, 27 and 28.)
    • [156] M. P. Papazoglou. Service-oriented computing: Concepts, characteristics and directions. In Fourth International Conference on Web Information Systems Engineering, pages 3{12. IEEE, 2003. (Cited on page 13.)
    • [157] M. P. Papazoglou. Web Services: Principles and Technology. Prentice Hall, Harlow, Essex, 2007. (Cited on pages v, vii, 1, 2, 14, 15, 16, 18, 28, 64, 65, 69, 72, 74, 75, 77 and 85.)
    • [158] M. P. Papazoglou and P. Ribbers. e-Business: Organizational and Technical Foundations. John Wiley & Sons Ltd., Chichester, West Sussex, 2006. (Cited on pages 2, 13, 19, 45, 55 and 85.)
    • [159] M. P. Papazoglou and W.-J. van den Heuvel. Business process development life cycle methodology. Communications of the ACM, 50(10):79{85, 2007. (Cited on page 18.)
    • [160] T. R. Peltier. Information Security Risk Analysis. Auerbach Publications, Boca Raton, FL, 2001. (Cited on page 156.)
    • [161] T. R. Peltier, J. Peltier, and J. A. Blackley. Information Security Fundamentals. Auerbach Publications, Boca Raton, FL, 2005. (Cited on pages 147 and 148.)
    • [162] R. M. Perlo . The Dynamics of Persuasion: Communication and Attitudes in the 21st Century. Lawrence Erlbaum Associates, Inc., Mahwah, NJ, second edition, 2003. (Cited on page 262.)
    • [164] J. T. Pollock and R. Hodgson. Adaptive Information: Improving Business Through Semantic Interoperability, Grid Computing, and Enterprise Integration. Wiley-Interscience, Hoboken, NJ, 2004. (Cited on page 150.)
    • [165] M. E. Porter. Strategy and the internet. 79(3):60{78, 2001. (Cited on page 12.)
    • [172] A. Rodr guez, E. Fernandez-Medina, and M. Piattini. Security requirement with a UML 2.0 pro le. In The First International Conference on Availability, Reliability and Security, pages 670{677, 2006. (Cited on pages 56 and 68.)
    • [173] A. Rodr guez, E. Fernandez-Medina, and M. Piattini. A BPMN extension for the modeling of security requirements in business processes. IEICE - Transactions on Information and Systems, E90-D(4):745{752, 2007. (Cited on page 56.)
    • [174] S. Rohrig and K. Knorr. Security analysis of electronic business processes. Electronic Commerce Research, 4(1-2):59{81, 2004. (Cited on pages 57, 58, 59 and 143.)
    • [182] F. Satoh, Y. Nakamura, N. K. Mukhi, M. Tatsubori, and K. Ono. Methodology and tools for end-to-end SOA security con gurations. In IEEE Congress on Services - Part I, pages 307{314. IEEE Computer Society, 2008. (Cited on page 237.)
    • [183] B. Schneier. Secrets and Lies: Digital Security in a Networked World. Wiley, Indianapolis, 2004. (Cited on page 31.)
    • [184] M. Schumacher and U. Roedig. Security engineering with patterns. In The 8th Conference on Pattern Languages of Programs (PLoP), Monticello, Illinois, 2001. (Cited on pages 58 and 59.)
    • [185] P. H. Schurr and J. L. Ozanne. In uences on exchange processes: Buyers' preconceptions of a seller's trustworthiness and bargaining toughness. The Journal of Consumer Research, 11(4):939{953, 1985. (Cited on page 24.)
    • [186] J. Sherwood, A. Clark, and D. Lynas. Enterprise Security Architecture: A Business-Driven Approach. CMP Books, San Francisco, CA, 2005. (Cited on pages 12, 36, 60, 66, 67 and 77.)
    • [187] N. Sidharth and J. Liu. IAPF: A framework for enhancing web services security. In 31st Annual International Computer Software and Applications Conference, pages 23{30, Beijing, China, 2007. (Cited on pages 19, 28, 29, 70, 78 and 279.)
    • [190] D. Skogan, R. Groenmo, and I. Solheim. Web service composition in UML. In Eighth IEEE International Enterprise Distributed Object Computing Conference, pages 47{57, 2004. (Cited on pages 55 and 76.)
    • [191] Software Engineering Institute, Carnegie Mellon University. Secure software development life cycle processes, 2009. https://buildsecurityin.uscert.gov/bsi/articles/knowledge/sdlc/326-BSI.html (Accessed 13 October 2010). (Cited on pages 36 and 37.)
    • [192] Software Engineering Institute, Carnegie Mellon University. TSP-Secure, nd. http://www.cert.org/secure-coding/secure.html (Accessed 13 October 2010). (Cited on pages 36 and 37.)
    • [193] I. Sommerville. Software Engineering. Addison-Wesley, Essex, eighth edition, 2007. (Cited on pages viii, 40, 41, 80, 162, 163, 165, 166 and 167.)
    • [194] C. Steel, R. Nagappan, and R. Lai. Core Security Patterns: Best Practices and Strategies for J2EETM, Web Services, and Identity Management. Prentice Hall PTR, 2005. (Cited on pages v, 23, 25, 29, 30, 32, 33, 51, 57, 58, 59, 61, 69, 70, 77, 85, 94, 95, 104, 106, 107, 115, 116, 128 and 279.)
    • [195] G. Stoneburner, A. Goguen, and A. Feringa. Risk management guide for information technology systems (NIST special publication 800-30). Technical report, National Institute of Standards and Technology (NIST), July 2002. (Cited on pages v, 47, 92, 93, 145, 146, 147, 156, 158 and 159.)
    • [196] B. Suh and I. Han. The IS risk analysis based on a business model. Information and Management, 41(2):149{158, 2003. (Cited on pages 47, 145, 147 and 148.)
    • [197] R. Swart, K. Forcht, D. Olsen, B. Marshall, and M. Harris. Security at the edge: Rethinking security in light of web services. Issues in Information Systems, 6(2):103{109, 2005. (Cited on pages 1, 2, 13 and 24.)
    • [198] M. Tatsubori, T. Imamura, and Y. Nakamura. Best-practice patterns and tool support for con guring secure web services messaging. In IEEE International Conference on Web Services, pages 244{251, Athens, Greece, 2004. IEEE Computer Society. (Cited on pages 76 and 237.)
    • [199] Techinsurance, Inc. Contractedge.com http://www.contractedge.com/contracts.html 2010). (Cited on pages 101 and 108.)
    • [205] J. S. Tiller. The Ethical Hack: A Framework for Business Value Penetration Testing. Auerbach Publications, Boca Raton, FL, 2005. (Cited on pages 20, 49, 127, 148, 158 and 246.)
    • [206] M. Todd, E. Zibert, and T. Midwinter. Security risk management in the BT HP alliance. BT Technology Journal, 24(4):47{52, 2006. (Cited on pages 127, 128, 233 and 238.)
    • [207] E. Triantaphyllou. Multi-Criteria Decision Making Methods: A Comparative Study. Kluwer Academic Publishers, Dordrecht, 2000. (Cited on pages vi, 259, 260, 262, 263, 299 and 303.)
    • [208] T. Tsiakis, E. Evagelou, G. Stephanides, and G. Pekos. Identi cation of trust requirements in an e-business framework. In The 8th WSEAS International Conference on Communications, Athens, Greece, 2004. (Cited on page 35.)
    • [209] B. Tsoumas and D. Gritzalis. Towards an ontology-based security management. In 20th International Conference on Advanced Information Networking and Applications, volume 1, pages 985{992, 2006. (Cited on pages 152 and 153.)
    • Lecture Notes in Computer Science, pages 500{510. Springer, Heidelberg, 2006. (Cited on page 140.)
    • [228] W.-C. Yau and G. R. K. Rao. Web services security in e-business: Attacks and countermeasures. In G. Radhamani and G. R. K. Rao, editors, Web Services Security And E-business, pages 165{183. IGI Publishing, Hershey, PA, 2007. (Cited on pages 24, 25 and 29.)
    • [229] W. D. Yu, D. Aravind, and P. Supthaweesuk. Software vulnerability analysis for web services software systems. In IEEE Symposium on Computers and Communications, pages 740{748. IEEE, 2006. (Cited on page 78.)
    • [230] W. D. Yu, R. B. Radhakrishna, S. Pingali, and V. Kolluri. Modeling the measurements of QoS requirements in web service systems. SIMULATION, 83(1):75{91, 2007. (Cited on pages 69 and 116.)
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article