Schwalb et al., 2010 - Google Patents
Analyzing the interoperability of WS-security and WS-reliablemessaging implementationsSchwalb et al., 2010
View PDF- Document ID
- 955544334060194433
- Author
- Schwalb J
- Schönberger A
- Publication year
External Links
Snippet
Since their invention as lightweight integration technology about a decade ago, Web Services have matured significantly. Today, major middleware solution vendors as well as industry communities like RosettaNet are propagating Web services even for exchanging …
- 238000000034 method 0 abstract description 73
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0639—Performance analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/01—Customer relationship, e.g. warranty
- G06Q30/018—Business or product certification or verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/101—Collaborative creation of products or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/103—Workflow collaboration or project management
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Martín et al. | Contracts for security adaptation | |
| Denker et al. | Owl-s semantics of security web services: A case study | |
| Barbir et al. | Challenges of testing web services and security in SOA implementations | |
| Robinson et al. | Implementing fair non-repudiable interactions with web services | |
| Schwalb et al. | Analyzing the interoperability of WS-security and WS-reliablemessaging implementations | |
| Bolte et al. | Self-Sovereign Identity: Development of an Implementation-Based Evaluation Framework for Verifiable Credential SDKs | |
| Cook et al. | Design and implementation of web services middleware to support fair non-repudiable interactions | |
| Tobarra et al. | Application of formal methods to the analysis of web services security | |
| Kumar | Model driven security analysis of IDaaS protocols | |
| Li et al. | Security considerations for workflow systems | |
| Shin | Web services | |
| Agenda | What is & Why Web Services? | |
| Shah et al. | Dynamic and ubiquitous security architecture for global SOA | |
| Wang | Web services for a Software Development Platform | |
| Nkomo | A software development framework for secure microservices | |
| Çamlibel | Secure service oriented architecture (soa) applications for subscriber based web services and its intranet support | |
| Shin | www. javapassion. com | |
| Li et al. | Zebra copy: A reference implementation of federated access management | |
| Schwalb | Interoperability and Functionality of WS-* Implementations | |
| Cook et al. | High-value B2B interactions, non-repudiation and Web services | |
| Cheong | Participant Domain Name Token Profile for security enhancements supporting service oriented architecture | |
| Cook | Middleware support for non-repudiable business-to-business interactions | |
| Vassilakis et al. | A framework for adaptation in secure web services | |
| Jansen | Service profiling in business to business web services | |
| Debie et al. | Non-repudiation middleware for web-based architectures |