Skip to main content

Page of 4
and
  1. Chapter and Conference Paper

    Online Reliability Time Series Prediction for Service-Oriented System of Systems

    A Service-Oriented System of System (or SoS) considers system as a service and constructs a value-added SoS by outsourcing external systems through service composition. To cope with the dynamic and uncertain r...

    Lei Wang, Hongbing Wang, Qi Yu, Haixia Sun in Service-Oriented Computing (2013)

  2. Chapter and Conference Paper

    A Novel Service Composition Approach for Application Migration to Cloud

    Migrating business applications to cloud can be costly, labor-intensive, and error-prone due to the complexity of business applications, the constraints of the clouds, and the limitations of existing migration...

    **anzhi Wang, Xuejun Zhuo, Bo Yang, Fan **g Meng, Pu ** in Service-Oriented Computing (2013)

  3. Chapter and Conference Paper

    An Incentive Mechanism for Game-Based QoS-Aware Service Selection

    QoS-aware service selection deals with choosing the service providers from the candidates which are discovered to fulfill a requirement, while meeting specific QoS constraints. In fact, the requester and its c...

    Puwei Wang, **aoyong Du in Service-Oriented Computing (2013)

  4. Chapter and Conference Paper

    Result Integrity Verification of Outsourced Frequent Itemset Mining

    The data-mining-as-a-service (DMaS) paradigm enables the data owner (client) that lacks expertise or computational resources to outsource its mining tasks to a third-party service provider (server). Outsourcing, ...

    Boxiang Dong, Ruilin Liu, Hui (Wendy) Wang in Data and Applications Security and Privacy… (2013)

  5. Chapter and Conference Paper

    Quantitative Security Risk Assessment of Android Permissions and Applications

    The booming of the Android platform in recent years has attracted the attention of malware developers. However, the permissions-based model used in Android system to prevent the spread of malware, has shown to...

    Yang Wang, Jun Zheng, Chen Sun in Data and Applications Security and Privacy… (2013)

  6. Chapter and Conference Paper

    TerraCheck: Verification of Dedicated Cloud Storage

    When hardware resources are shared between mutually distrustful tenants in the cloud, it may cause information leakage and bring difficulties to regulatory control. To address these concerns, cloud providers a...

    Zhan Wang, Kun Sun, Sushil Jajodia in Data and Applications Security and Privacy… (2013)

  7. Chapter and Conference Paper

    Automatically Composing Services by Mining Process Knowledge from the Web

    Current approaches in Service-Oriented Architecture (SOA) are challenging for users to get involved in the service composition due to the in-depth knowledge required for SOA standards and techniques. To shield...

    Bipin Upadhyaya, Ying Zou, Shaohua Wang, Joanna Ng in Service-Oriented Computing (2013)

  8. Chapter and Conference Paper

    Test-Enabled Architecture for IoT Service Creation and Provisioning

    The information generated from the Internet of Things (IoT) potentially enables a better understanding of the physical world for humans and supports creation of ambient intelligence for a wide range of applicatio...

    Suparna De, Francois Carrez, Eike Reetz, Ralf Tönjes, Wei Wang in The Future Internet (2013)

  9. Chapter and Conference Paper

    WT-LDA: User Tagging Augmented LDA for Web Service Clustering

    Clustering Web services that groups together services with similar functionalities helps improve both the accuracy and efficiency of the Web service search engines. An important limitation of existing Web serv...

    Liang Chen, Yilun Wang, Qi Yu, Zibin Zheng, Jian Wu in Service-Oriented Computing (2013)

  10. Chapter and Conference Paper

    Enhancing Traffic Locality in BitTorrent via Shared Trackers

    The fast-growing traffic of peer-to-peer (P2P) applications, most notably BitTorrent, is putting unprecedented pressure to Internet Service Providers (ISPs). P2P locality has therefore been widely suggested to...

    Haiyang Wang, Feng Wang, Jiangchuan Liu, Ke Xu in NETWORKING 2012 (2012)

  11. Chapter and Conference Paper

    Map**s from BPEL to PMR for Business Process Registration

    In order to facilitate business collaboration and interoperation in virtual enterprises, it is crucial to discover appropriate business processes modeled in different languages and stored in different reposito...

    **gwei Cheng, Chong Wang, Keqing He in Collaborative Networks in the Internet of … (2012)

  12. Chapter and Conference Paper

    Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary Attacks

    We study the security requirements for remote authentication with password protected smart card. In recent years, several protocols for password-based authenticated key exchange have been proposed. These proto...

    Yongge Wang in Information Security and Privacy Research (2012)

  13. Chapter and Conference Paper

    Degree and Principal Eigenvectors in Complex Networks

    The largest eigenvalue λ 1 of the adjacency matrix powerfully characterizes dynamic processes on networks, such as virus spread and synchronization. The minimization of the spectral radius by remo...

    Cong Li, Huijuan Wang, Piet Van Mieghem in NETWORKING 2012 (2012)

  14. Chapter and Conference Paper

    Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards

    In DBSec’11, Li et al. showed that Kim and Chung’s password-based remote user authentication scheme is vulnerable to various attacks if the smart card is non-tamper resistant. Consequently, an improved version...

    Ding Wang, Chun-guang Ma, Peng Wu in Data and Applications Security and Privacy XXVI (2012)

  15. Chapter and Conference Paper

    RandHyp: Preventing Attacks via Xen Hypercall Interface

    Virtualization plays a key role in constructing cloud environments and providing services. Although the main jobs of the hypervisors are to guarantee proper isolation between domains and provide them services,...

    Feifei Wang, ** Chen, Bing Mao, Li **e in Information Security and Privacy Research (2012)

  16. Chapter and Conference Paper

    Modeling Social Engineering Botnet Dynamics across Multiple Social Networks

    In recent years, widely spreading botnets in social networks are becoming a major security threat to both social networking services and the privacy of their users. In order to have a better understanding of t...

    Shuhao Li, **aochun Yun, Zhiyu Hao in Information Security and Privacy Research (2012)

  17. Chapter and Conference Paper

    Dynamic Performance Management in Multi-tenanted Business Process Servers Using Nonlinear Control

    The methodologies to develop multi-tenanted architectures have been investigated in the recent literature due to the popularity of cloud computing. A number of challenges need to be overcome if multi-tenanted ...

    Tharindu Patikirikorala, Indika Kumara, Alan Colman, Jun Han in Service-Oriented Computing (2012)

  18. Chapter and Conference Paper

    WCP-Nets: A Weighted Extension to CP-Nets for Web Service Selection

    User preference often plays a key role in personalized applications such as web service selection. CP-nets is a compact and intuitive formalism for representing and reasoning with conditional preferences. Howe...

    Hongbing Wang, Jie Zhang, Wenlong Sun, Hongye Song in Service-Oriented Computing (2012)

  19. Chapter and Conference Paper

    Sign What You Really Care about – Secure BGP AS Paths Efficiently

    The inter-domain routing protocol, Border Gateway Protocol (BGP), plays a critical role in the reliability of the Internet routing system, but forged routes generated by malicious attacks or mis-configurations...

    Yang **ang, Zhiliang Wang, Jian** Wu, **ngang Shi, **a Yin in NETWORKING 2012 (2012)

  20. Chapter and Conference Paper

    Routing On Demand: Toward the Energy-Aware Traffic Engineering with OSPF

    Energy consumption has already become a major challenge to the current Internet. Most researches aim at lowering energy consumption under certain fixed performance constraints. Since trade-offs exist between n...

    Meng Shen, Hongying Liu, Ke Xu, Ning Wang, Yifeng Zhong in NETWORKING 2012 (2012)

Page of 4