Signature-based composition of web services

被引:2
|
作者
Alkamari, Aniss [1 ]
Mili, Hafedh [1 ]
Obaid, Abdel [1 ]
机构
[1] Univ Quebec Montreal, Fac Sci, Lab LATECE, Montreal, PQ, Canada
关键词
D O I
10.1109/MCETECH.2008.34
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The web services family of standards promotes the interoperability of heterogeneous distributed systems by separating the definition of a service from, 1) its implementation language, 2) its internal data representation, and 3) the communication protocol used to access it. The UDDI standard addresses aspects related to the publication and querying of enterprise business services, but the kind of representation that is supported, and the corresponding queries have limited functionality. We are interested in the problem of querying a UDDI registry with a functional specification of a service, and getting in return a single service, or a composition of services that address the functional need. Existing approaches to web service composition rely on external semantic knowledge to identify candidate component services. Our approach relies on service signatures (message types). We describe the principles underlying our approach, a family of algorithms for web service composition, our implementation of these algorithms, and the preliminary experimental results.
引用
收藏
页码:104 / 115
页数:12
相关论文
共 50 条
  • [21] Ring Signature-Based Voting on Blockchain
    Kugusheva, Alexandra
    Yanovich, Yury
    ICBTA 2019: 2019 2ND INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY AND APPLICATIONS, 2019, : 70 - 75
  • [22] Secure anonymous signature-based transactions
    Van Herreweghen, E
    COMPUTER SECURITY - ESORICS 2000, PROCEEDINGS, 2000, 1895 : 55 - 71
  • [23] Parsimony in signature-based target identification
    Baum, CE
    ULTRA-WIDEBAND, SHORT-PULSE ELECTROMAGNETICS 5, 2002, : 605 - 614
  • [24] A novel signature-based packet classification
    Chen, YT
    Yang, YH
    GLOBECOM '01: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2001, : 2275 - 2279
  • [25] Signature-Based Methods for Data Streams
    Corinna Cortes
    Daryl Pregibon
    Data Mining and Knowledge Discovery, 2001, 5 : 167 - 182
  • [26] Pointcheval-Sanders Signature-Based Synchronized Aggregate Signature
    Tezuka, Masayuki
    Tanaka, Keisuke
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2022, 2023, 13849 : 317 - 336
  • [27] Signature-based Algorithms to Compute Grobner Bases
    Eder, Christian
    Perry, John
    ISSAC 2011: PROCEEDINGS OF THE 36TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND ALGEBRAIC COMPUTATION, 2011, : 99 - 106
  • [28] Discussion of signature-based models of preventive maintenance
    Suarez-Llorens, Alfonso
    APPLIED STOCHASTIC MODELS IN BUSINESS AND INDUSTRY, 2023, 39 (01) : 59 - 61
  • [29] Signature-Based Secure Trajectory Similarity Search
    Teng, Yiping
    Shi, Zhan
    Zhao, Fanyou
    Ding, Guohui
    Xu, Li
    Fan, Chunlong
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 196 - 206
  • [30] Signature-Based Witness Encryption with Compact Ciphertext
    Avitabile, Gennaro
    Doettling, Nico
    Magri, Bernardo
    Sakkas, Christos
    Wohnig, Stella
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT I, 2025, 15484 : 3 - 31