منابع مشابه
Verifying Web Services Security Configurations
XML Web Services provide a flexible API for building distributed systems as a collection of endpoints that can send and receive SOAP messages. These systems are secured using message-based cryptographic mechanisms defined in a series of specifications developed by Microsoft, IBM, and others. Such home-grown security protocols often go wrong; they are prone to a well-known class of attacks, form...
متن کاملThe Adaptation of Agent Configurations using Web Services as Components
To support dynamic and reactive behaviour we have developed an Agent Factory which (re-)structures an agent configuration using existing components. In this paper we present our current work which uses Web services as the components. Our initial work has focused on configuring Web services to create a design artifact. This is achieved by reasoning about the requirements and the semantic descrip...
متن کاملConfigurations of low-contact services
This study uses a cluster analysis procedure to develop a classification model of low-contact services based on seven operations objectives. The effectiveness of the classification scheme is tested by demonstrating the link between the objectives, competitive priorities, and performance. This study also identifies eight underlying factors of competitive priorities in low-contact services. Furth...
متن کاملBioMoby web services to support clustering of co-regulated genes based on similarity of promoter configurations
UNLABELLED Here we present a computational protocol to analyze the promoter regions of a given set of co-expressed genes, and its implementation through the use of Web services technologies. This protocol aims to cluster a set of co-regulated genes in subsets of genes showing similar configurations of transcription factor binding sites. All the steps of this protocol have been developed as web ...
متن کاملWeb Services and Web Services Security
Web services are self-contained modular applications that provide a computation upon request. These services can be described, published, located, and invoked over a network, generally over the Internet. However, intranets, extranets, and LANs can also be used. as well. In using web services for its information systems needs, a firm may open access to its information assets. This action can bec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronic Notes in Theoretical Computer Science
سال: 2007
ISSN: 1571-0661
DOI: 10.1016/j.entcs.2007.03.004