• Publications
  • Influence
A Secure Web Services Model Based on the Combination of SOAP Registration Info and Token Proxy
TLDR
A SOAP information registration and security token proxy model for Web services (SIRSTPM). Expand
Research on availability prediction model of web service
TLDR
In this paper, we present a web service availability prediction model based on Markov and queuing model. Expand
Modeling Business Process of Web Services with an Extended STRIPS Operations to Detection Feature Interaction Problems Runtime
TLDR
This paper investigates the detection of feature interactions in web services at runtime and proposes ESTRIPs, an extended STRIPS operation conflict-free of services in business process detection method, which reasons from OWL-S and SWRL combined with runtime SOAP messages. Expand
Enhancing Rough Set and Formal Context based Ontology Mapping Method with Attribute Reduction
TLDR
In this paper, the problem of the reduction of formal context in the mapping process of the RFCA model is addressed, and a method using Attribute Reduction to enhance the ontology mapping method is proposed. Expand
Towards Mapping Large Scale Ontologies Based on RFCA with Attribute Reduction
TLDR
This paper addresses the problem of the reduction of formal context in the mapping process of the RFCA model to adapt the large scale ontologies. Expand
Web Services Selection with User Security Attributes Preferences
TLDR
This paper address the problem of service selection based on the Web services security assessment and provide intuitive and effective decision-making basis for services selection. Expand
Predicting Service Execution Time towards a Runtime Monitoring Approach
TLDR
This paper presents a prediction method for Web services execution time based on monitoring service data collected at runtime. Expand
Dynamic Web Service Evaluation Using Markov Process
TLDR
We present a novel tactic to model Web services invocation using Markov process, which can be analyzed to determine its steady state behavior for each Web service. Expand
WS-S Evaluation Based on User Preferences and Ranking Mechanism
TLDR
We propose a WS-Security comprehensive evaluation method based on user preferences and ranking mechanism, it is an effective solution for comprehensive evaluation of the WS-S to a certain extent. Expand
...
1
2
...