Proceedings. IEEE International Conference on Web Services, 2004. 2004
DOI: 10.1109/icws.2004.1314724
|View full text |Cite
|
Sign up to set email alerts
|

Monitoring e-business Web services usage through a log based architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
21
0
1

Year Published

2006
2006
2015
2015

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(22 citation statements)
references
References 6 publications
0
21
0
1
Order By: Relevance
“…The monitoring methods selected were monitoring using a software-based communications eavesdropper (Wireshark) [10], which represents the eavesdropper type monitor in Figure 1; and monitoring using a Web service based intercepting proxy, which represents the proxy type monitor in Figure 1. These methods of monitoring were selected because they are commonly used by others [5], [8] and are easily repeatable.…”
Section: B Experiments Variablesmentioning
confidence: 99%
See 1 more Smart Citation
“…The monitoring methods selected were monitoring using a software-based communications eavesdropper (Wireshark) [10], which represents the eavesdropper type monitor in Figure 1; and monitoring using a Web service based intercepting proxy, which represents the proxy type monitor in Figure 1. These methods of monitoring were selected because they are commonly used by others [5], [8] and are easily repeatable.…”
Section: B Experiments Variablesmentioning
confidence: 99%
“…[5]- [9] just to name a few). We have summarized these techniques and frameworks in Table II, including their overheads or impacts as measured by the original authors.…”
mentioning
confidence: 99%
“…Indeed they are complementary in order to offer the services. Thus, we clearly see that Web services are one of the key mechanisms that represent a significant advance in the e-business of the future [23].…”
Section: Web Servicementioning
confidence: 99%
“…The information retained by FWSs as a trusted third party can be provided to forensic examiners. Previous proposals for monitoring web services [6] and generating evidence [10,16,26] are primarily for business purposes. We are not aware of similar applications that support forensic investigations.…”
Section: Introductionmentioning
confidence: 99%
“…We show that nonrepudiable logging of critical information exchanges is an effective way to meet these needs. Some logging and processing approaches already exist for web services [5,6,28]. Also, Sremack [30] has proposed an approach for conducting online investigations.…”
Section: Introductionmentioning
confidence: 99%