Learn More
Distributed Denial-of-Service attack (DDoS) is a major threat for cloud environment. Traditional defending approaches cannot be easily applied in cloud security due to their relatively low efficiency, large storage, to name a few. In view of this challenge, a Confidence-Based Filtering method, named CBF, is investigated for cloud computing environment, in(More)
The performance of a service's QoS may evolve relatively frequently with its internal changes or the changes of dynamic Internet environment, especially when some"intentional" deceptions are taken into consideration. Therefore, the service providers could not always deliver their services according to their "promised" quality. In view of this challenge, a(More)
There exist so many web services that share same or similar functional properties, so it is often a challenging effort to select a credible and optimal web service based on their various history QoS records. In view of this challenge, in this paper, a novel QoS-aware web service selection method is put forward, based on credibility evaluation associated(More)
Cloud computing has become one of the most demanding services over the internet. It has gained remarkable fame for past few years. But it is under the severe threats of internet security. One of the severe threats is Distributed Denial of Service (DDoS). DDoS occurs when a huge amount of packets are sent to a server from various computers. Botnet is one of(More)
Web service composition allows users to create value-added composite Web services on existent services, where top-k composite services are helpful for users to find a satisfying composite service efficiently. However, with an increasing number of Web services and users' various composition preferences, computing top-k composite services dynamically for(More)
Generally, it is often a challenging issue to develop a QoS-optimal service composition schema from vast amount of services. In view of this challenge, an automatic service composition method is proposed, in this paper, to deal with the situation that the input functional properties and the output functional properties are specified in advance. More(More)