: Will Aalst, John Mylopoulos, Norman M. Sadeh, Michael J. Shaw, Clemens Szyperski, Joaquim Filipe, Jo
: Web Information Systems and Technologies Third International Conference, WEBIST 2007, Barcelona, Spain, March 3-6, 2007, Revised Selected Papers
: Springer-Verlag
: 9783540682622
: 1
: CHF 52.40
:
: Internet
: English
: 353
: DRM
: PC/MAC/eReader/Tablet
: PDF

This book constitutes the thoroughly refereed post-conference proceedings of the 3rd Interntaional Conference on Web Information Systems and Technologies, held in Barcelona, Spain, in March 2007. The 23 papers presented in this book were carefully reviewed and selected from 367 submissions. Their extended and revised versions are published in this book together with 2 invited lectures.The contributions cover topics on internet technology, Web interfaces and applications, society, e-business and e-government, and e-learning.

Preface5
Organization6
Table of Contents10
Invited Papers13
Programming Support and Governance for Process-Oriented Software Autonomy14
Introduction14
Business Process Runtime Requirements for Self-governance16
Implementation of Autonomic Management17
A Simple Example19
A Case Study22
Architectural Autonomy22
Behavioural Autonomy24
Evaluation24
Adaptation Scenario25
Introducing Neptune to the PetShop/Pet Store25
Results26
Conclusions28
References28
Representing and Validating Digital Business Processes30
Introduction30
Rule-Based Business Modeling31
Logical Models for BR Languages33
BR vs. Semantic Web-Style Knowledge Representation35
Combining DL and Horn Rules38
An Example of Hybrid Reasoning39
Hybrid Reasoning40
Related Work41
Conclusions42
References42
Part I Internet Technology44
Semi-automated Content Zoning of Spam Emails45
Introduction45
Content Zoning47
Annotated Regions in Texts47
Identification of Spam Emails48
The COZO Explorer49
A Spam Thesaurus49
The Graphical User Interface50
Selected Results50
Zoning Pharmaceutical Spam Emails50
Zoning Financial Spam Emails51
Automated Image Sorting52
Conclusions53
References53
Security and Business Risks from Early Design of Web-Based Systems55
Introduction55
Related Work57
Security Risk Analysis57
Preliminaries57
Methodology58
A Case Study61
Web Application Design61
Estimating Security Risks63
Business Risk Analysis66
Concluding Remarks68
References68
Designing Decentralized Service Compositions: Challenges and Solutions70
Introduction70
Background71
Formal Considerations72
Deriving Cooperating Processes74
Dealing with the Consistency of Derived Processes74
Putting the Deriving Operation into Practice75
Wiring with Postset Activities76
Wiring with Preset Activities78
Conclusions80
References80
Grid Infrastructure Architecture: A Modular Approach from CoreGRID82
Introduction82
Functional Components of a Framework Architecture84
Workflow Analyzer85
Checkpointing86
User and Account Management87
ResourceMonitoring88
Integration between Functional Components89
Comparison with Other Works91
Conclusions92
References93
The Privacy Advocate: Assertion of Privacy by Personalised Contracts95
Introduction95
Related Work96
Negotiation Extensions97
Requirements and Facultative Requests97
Permissions and Prohibitions98
Privacy Contracts98
Privacy Advocate98
Negotiation Process99
Policy Evaluation100
Protocol Issues103
Implementation103
Mobile PrivAd Client103
PrivAd Server104
Digital Signature104
Negotiation Strategies104
Summary and Outlook106
References106
Efficient Queries on XML Data through Partitioning108
Introduction108
Related Work109
XPathBasics110
Our Partitioning Method111
Implementation Options113
Relational Implementation113
Native Implementation114
Experimental Results115
Relational Implementation115
Native Implementation116
Conclusions117
References118
Contract Based Behavior Model for Services Coordination119
Introduction119
Coordination Model with Transactional Behavior Properties121
Service122
Orchestration122
Activity123
Transactional Behavior Model124
Contract125
Atomicity Contracts127
Defining Transactional Behavior for an e-Commerce Applica