[1]
|
L. Cherbakov, G. Galambos, R. Harishankar, S. Kalyana, and G. Rackham, “Impact of Service Orientation at the Business Level,” IBM Systems Journal, Vol. 44, No. 4, 2005, pp. 653-668. doi:10.1147/sj.444.0653
|
[2]
|
L. Zeng, B. Benatallah, A. Ngu, M. Dumas, J. Kalagnanam and H. Chang, “QoS-Aware Middleware for Web Services Composition,” IEEE Transactions on Software Engineering, Vol. 30, No. 5, May 2004, pp. 311-327. doi: 10.1109/TSE.2004.11
|
[3]
|
BIGSF, “Government Web Application Integrity,” The Business Internet Group, San Francisco, 2003.
|
[4]
|
S. Bhiri, O. Perrin and C. Godart, “Ensuring Required Failure Atomicity of Composite Web Services,” Proceedings of the International World Wide Web Conference (WWW’05), Chiba, 2005, pp. 138-147.
|
[5]
|
“Will Reliability Kill the Web Service Composition?” 2010. http://www.cs.rutgers.edu/rmartin/teaching/spring 04/cs553/papers/009.pdf
|
[6]
|
J. Cardoso, A. Sheth, J. Miller, J. Arnold and K. Kochut, “Quality of Service for Workflows and Web Service Pro- cesses,” Web Semantics: Science, Services and Agents on the World Wide Web, Vol. 1, No. 3, April 2004, pp. 281-308. doi:10.1016/j.websem.2004.03.001
|
[7]
|
N. Russell, A. H. ter Hofstede, W. M. van der Aalst and N. Mulyar, “Workflow Control-Flow Patterns: A Revised View,” BPM Center Report BPM-06-22, BPMcenter.org, 2006.
|
[8]
|
W. M. P van der Aalst, A. H. M. ter Hofstede, B. Kie- Puszewski and A. P. Barros, “Workflow Patterns,” Distri- buited and Parallel Database, Vol. 14, No. 3, 2003, pp. 5-51.
|
[9]
|
Y. Qian, Y. Xu, Z. Wang, G. Pu, H. Zhu and C. Cai, “Tool Support for BPEL Verification in ActiveBPEL Engine,” Proceeding of 18th Australian Software Engineering Conference (ASWEC 2007), Australia, 2007, pp. 90-100. doi:10.1109/ASWEC.2007.50
|
[10]
|
“WS-BPEL Specification,” http://www.oasis-open.org/committees/tchome.php?wgabbrev=sbpel(lastaccessed30/11/2010)OASISSecurityAssertionMarkupLanguage(SAML), http://www.oasis?open.org/committees/tchome.php?wgabbrev =security(last accessed30/11/2010)
|
[11]
|
E. Gamma, R. Helm, R. Johnson and J. Vlissides, “Design Pattern—Elements of Reusable Object-Oriented Software,” Addison-Wesley, Menlo Park, California 1995.
|
[12]
|
S. Bhiri, O. Perrin and C. Godart, “Extending Workflow Patterns with Transactional Dependencies to Define Re- Liable Composite Web Services,” Proceedings of the Ad- vanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services, Guadeloupe, 2006.
|
[13]
|
L. Coppolino, L. Romano, N. Mazzocca and S. Salvi, “Web Services Workflow Reliability Estimation Through Reliability Patterns,” Proceedings of the 3rd International Conference on Security and Privacy in Communications Networks and the Workshops, (SecureComm'07), 2007, pp.107-115.
|
[14]
|
F. Campanile, L. Coppolino, S. Giordano and L. Romano, “A Business Process Monitor for a Mobile Phone Re- charging System,” Journal of System Architecture, Vol. 54, No. 9, 2008, pp. 843-848. doi:10.1016/j.sysarc.2008. 02.005
|
[15]
|
“The WS-Federation Specification,” 2010, http://msdn2.microsoft.com/enus/library/ms951236.aspx
|
[16]
|
“OASIS Security Assertion Markup Language (SAML),” http://www.oasis-open.org/committees/tc_home.php?wg_abbrev = security (last accessed 30/11/2010)
|
[17]
|
“MathEclipse Project,” 2010, http://sourceforge.net/projects/matheclipse/
|
[18]
|
P. Chan, M. Lyu and M. Malek, “Making Services Fault Tolerant,” Lecture Notes in Computer Science, Vol. 4328, pp. 43-61, 2006. doi:10.1007/11955498_4
|