Signature-based composition of web services

被引:2
|
作者
Alkamari, Aniss [1 ]
Mili, Hafedh [1 ]
Obaid, Abdel [1 ]
机构
[1] Univ Quebec Montreal, Fac Sci, Lab LATECE, Montreal, PQ, Canada
关键词
D O I
10.1109/MCETECH.2008.34
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The web services family of standards promotes the interoperability of heterogeneous distributed systems by separating the definition of a service from, 1) its implementation language, 2) its internal data representation, and 3) the communication protocol used to access it. The UDDI standard addresses aspects related to the publication and querying of enterprise business services, but the kind of representation that is supported, and the corresponding queries have limited functionality. We are interested in the problem of querying a UDDI registry with a functional specification of a service, and getting in return a single service, or a composition of services that address the functional need. Existing approaches to web service composition rely on external semantic knowledge to identify candidate component services. Our approach relies on service signatures (message types). We describe the principles underlying our approach, a family of algorithms for web service composition, our implementation of these algorithms, and the preliminary experimental results.
引用
收藏
页码:104 / 115
页数:12
相关论文
共 50 条
  • [1] Signature-based Selection of IaaS Cloud Services
    Fattah, Sheik Mohammad Mostakim
    Bouguettaya, Athman
    Mistry, Sajib
    2020 IEEE 13TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2020), 2020, : 50 - 57
  • [2] The SICILIAN Defense: Signature-based Whitelisting of Web Java']JavaScript
    Soni, Pratik
    Budianto, Enrico
    Saxena, Prateek
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1542 - 1557
  • [3] A Signature-Based Intrusion Detection System for Web Applications based on Genetic Algorithm
    Bronte, Robert
    Shahriar, Hossain
    Haddad, Hisham M.
    SECURITY OF INFORMATION AND NETWORKS (SIN'16), 2016, : 32 - 39
  • [4] Oblivious signature-based envelope
    Li, NH
    Du, WL
    Boneh, D
    DISTRIBUTED COMPUTING, 2005, 17 (04) : 293 - 302
  • [5] Signature-based landscape design
    Woodward, JH
    ECOLOGICAL DESIGN AND PLANNING, 1997, : 201 - 225
  • [6] Oblivious signature-based envelope
    Ninghui Li
    Wenliang Du
    Dan Boneh
    Distributed Computing, 2005, 17 : 293 - 302
  • [7] Signature-based image identification
    Abdel-Mottaleb, M
    Vaithilingam, G
    Krishnamachari, S
    MULTIMEDIA SYSTEMS AND APPLICATIONS II, 1999, 3845 : 22 - 28
  • [8] Signature-based and Machine-Learning-based Web Application Firewalls: A Short Survey
    Applebaum, Simon
    Gaber, Tarek
    Ahmed, Ali
    AI IN COMPUTATIONAL LINGUISTICS, 2021, 189 : 359 - 367
  • [9] Why HTTPS is not enough - A signature-based architecture for trusted content on the Social Web
    Quasthoff, Matthias
    Sack, Harald
    Meinel, Christoph
    PROCEEDINGS OF THE IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE: WI 2007, 2007, : 820 - 824
  • [10] On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks
    Diaz-Verdejo, Jesus
    Munoz-Calle, Javier
    Estepa Alonso, Antonio
    Estepa Alonso, Rafael
    Madinabeitia, German
    APPLIED SCIENCES-BASEL, 2022, 12 (02):