2009 IEEE International Conference on Web Services 2009
DOI: 10.1109/icws.2009.50
|View full text |Cite
|
Sign up to set email alerts
|

DIALOG: Distributed Auditing Logs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…[23] presented a Web services logging architecture WSLogA based on SOAP intermediaries that captures comprehensive services usage information. [24] presented a method of auditing the distributed processing of data in service-oriented systems named DIALOG (DIstributed Auditing LOGs). But, it is difficult to record process information of composite services for all above studies.…”
Section: Related Workmentioning
confidence: 99%
“…[23] presented a Web services logging architecture WSLogA based on SOAP intermediaries that captures comprehensive services usage information. [24] presented a method of auditing the distributed processing of data in service-oriented systems named DIALOG (DIstributed Auditing LOGs). But, it is difficult to record process information of composite services for all above studies.…”
Section: Related Workmentioning
confidence: 99%
“… presented a Web services logging architecture WSLogA based on SOAP intermediaries, which captures comprehensive services usage information. Ringelstein and Staab presented a solution, in the form of an architecture, a formalization and an implemented prototype for logging and collecting logs in service‐oriented and cross‐organization systems. But, it is difficult to record process information of composite services for all the aforementioned works.…”
Section: Composite Service Selection Based On Sese Patternsmentioning
confidence: 99%
“…Table 2 gives an overview of selected technologies and assigns them to the relevant market tiers. To implement the requirement of accountability in the 1 st and 2 nd tiers, different systems based on sticky PI usage policies and audit logs are available [8], [34][35]. Most accountability systems suitable for ensuring contextual integrity are based on cryptographic technologies that can be easily applied in distributed environments [36][37].…”
Section: Technical Enablersmentioning
confidence: 99%