Learn More
This paper presents a middleware that supports reliable Web services built on active replication. The middleware is responsible for maintaining the consistency of the replicas' states. A Java package for handling the interactions with the middleware and the failures of the Web services is provided for programmers to use when writing client applications. The(More)
  • Xinfeng Ye
  • 6th IEEE/ACIS International Conference on…
  • 2007
The paper presents a middleware that provides reliable web services using the active replication technique. The middleware uses a timestamp-based protocol to maintain the consistency of the replicas' states. Compared with the optimistic active replication protocol and group communication primitives, the protocol used in this paper reduces the replication(More)
QoS-aware service composition intends to maximize the QoS of a composite service when selecting service providers. This paper proposes a service composition scheme that uses a combination of Integer Programming, case-based reasoning, and, genetic algorithms techniques. The scheme reduces the service composition costs by reusing existing compositions.(More)
  • Xinfeng Ye
  • 2008 IEEE/IFIP International Conference on…
  • 2008
Cyber-criminals use distributed denial-of-service attacks (DDoS) and XML denial-of-service attacks (XDoS) to extort money from online service providers. This kind of attacks is normally targeted at a particular service provider to exhaust the network and system resources of the provider. This paper proposes a scheme for building a defense system against(More)
  • Xinfeng Ye
  • 2006 IEEE International Conference on Web…
  • 2006
This paper presents an approach for providing a reliable distributed Web service execution engine. Instead of using a Web service execution engine running on a single host to conduct the execution of a composite service, the responsibility of conducting the execution of the composite service has been delegated to the service providers that are chosen to(More)
Distributed denial-of-service (DDoS) attacks are increasingly mounted by cyber-criminal gangs to extort money from online businesses. This kind of attacks is normally targeted at a particular service provider to exhaust the network and system resources of the provider. Since the scale of the attack is limited, the ISP operators normally cannot observe this(More)
This paper proposes a scheme that allows the webservice providers to carry out fine-grained access control onthe data hosted by them. Through data tracking, the schemealso automatically detects the data flows that might lead toattacks on online services. Compared with existing schemes,the proposed scheme is more flexible in managing the data onthe service(More)
A composite service can be built from Web Services, and, its workflow can be specified using BPEL4WS. Many composite services are long-running transactional processes. This paper proposes a concurrency control scheme for executing transactional composite services. The scheme uses the information gathered from the workflow specifications of the composite(More)