Author image not provided
 Yue Zhang

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article19.95
Citation Count379
Publication count19
Publication years2005-2010
Available for download6
Average downloads per article1,398.83
Downloads (cumulative)8,393
Downloads (12 Months)355
Downloads (6 Weeks)56
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


19 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 19 of 19
Sort by:

1 published by ACM
April 2010 ACM SIGOPS Operating Systems Review: Volume 44 Issue 2, April 2010
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 4,   Downloads (12 Months): 8,   Downloads (Overall): 143

Full text available: PDFPDF
In order to be economically feasible and to offer high levels of availability and performance, large scale distributed systems depend on the automation of repair services. While there has been considerable work on mechanisms for such automated services, a framework for evaluating and optimizing the policies governing such mechanisms has ...

2
March 2009 IEEE Internet Computing: Volume 13 Issue 2, March 2009
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 10

The Intelligent Accountability Middleware Architecture (Llama) project supports dependable service-oriented architecture (SOA) monitoring, runtime diagnosis, and reconfiguration. At its core, Llama implements an accountability service bus that users can install on existing service-deployment infrastructures. It collects and monitors service execution data from a key subset of services; enables Llama users ...
Keywords: monitoring, accountability, ESB, SOA, SOA, accountability, ESB, monitoring, middleware, middleware

3
December 2008 ICSOC '08: Proceedings of the 6th International Conference on Service-Oriented Computing
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 5

Enterprises are turning to SOA for the flexible deployment of business processes. While current monitoring tools can detect service execution problems in an enterprise's servers and report such problems to human decision makers, they may not closely monitor the external services they use, diagnose the root cause of process problems, ...

4
July 2008 CECANDEEE '08: Proceedings of the 2008 10th IEEE Conference on E-Commerce Technology and the Fifth IEEE Conference on Enterprise Computing, E-Commerce and E-Services
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1

Service-oriented architecture (SOA) provides a flexible paradigm to dynamically compose service processes from individual services. The flexibility, on the other hand, makes it necessary to monitor and manage service behaviors at runtime for performance assurance. One solution is to deploy software monitoring agents. In this paper, we present an approach ...
Keywords: agent, accountability, monitor, set covering, Service-Oriented Architecture

5 published by ACM
June 2008 SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies
Publisher: ACM
Bibliometrics:
Citation Count: 12
Downloads (6 Weeks): 4,   Downloads (12 Months): 8,   Downloads (Overall): 374

Full text available: PDFPDF
A key issue in RBAC systems is how to efficiently handle the user authorization process. That is, whether or not to grant a user's request to acquire a set of requested permissions or to activate a set of requested roles in a single session. The presence of hybrid hierarchies as ...
Keywords: administration, authorization, role mapping, hybrid hierarchy, RBAC

6 published by ACM
January 2008 ACM Transactions on Information and System Security (TISSEC): Volume 10 Issue 4, January 2008
Publisher: ACM
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 1,   Downloads (12 Months): 20,   Downloads (Overall): 560

Full text available: PDFPDF
A role hierarchy defines permission acquisition and role-activation semantics through role--role relationships. It can be utilized for efficiently and effectively structuring functional roles of an organization having related access-control needs. The focus of this paper is the analysis of hybrid role hierarchies in the context of the generalized temporal role-based ...
Keywords: Role hierarchy, Derived relation

7
January 2008
Bibliometrics:
Citation Count: 0

In this dissertation, a QoS accountability management model is designed to detect, diagnose, and defuse the root cause of problems when service delivery exceptions (such as incorrect result or SLA violation) occur in Service-Oriented Architectures (SOA). Although SOA provides a powerful and flexible paradigm to compose dynamic service processes using ...

8
October 2007 ICEBE '07: Proceedings of the IEEE International Conference on e-Business Engineering
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 3

As more enterprises turn to SOA for the flexible deployment of business processes, adaptable and highly configurable infrastructures can be used to ensure that end-to-end quality of service requirements are met via automatic and dynamic process monitoring, diagnosis, and routing. We present the inteLLigent Accountability Middleware Architecture (LLAMA) to support ...

9
August 2007 IAS '07: Proceedings of the Third International Symposium on Information Assurance and Security
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1

Recently, administration of RBAC systems using a role-based approach has become very appealing because of the benefits that such an approach typically brings. This approach uses RBAC itself to manage RBAC policies so that the administration functions can be decentralized and made more efficient. Existing RBAC administration models, however, fail ...

10
June 2007 SOCA '07: Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 2

Service-Oriented Architecture (SOA) provides a powerful and flexible paradigm to compose dynamic service processes using individual atomic services. However, these service processes can become vastly complex, involving many service partners, thereby giving rise to difficulties in terms of runtime problem detection and determination. In this research, we propose hierarchical service ...
Keywords: Service-Oriented Architecture, Accountability, Bayesian Network, Hierarchical, Diagnosis, Business Process

11 published by ACM
May 2007 WWW '07: Proceedings of the 16th international conference on World Wide Web
Publisher: ACM
Bibliometrics:
Citation Count: 103
Downloads (6 Weeks): 30,   Downloads (12 Months): 202,   Downloads (Overall): 2,420

Full text available: PDFPDF
Phishing is a significant problem involving fraudulent email and web sites that trick unsuspecting users into revealing private information. In this paper, we present the design, implementation, and evaluation of CANTINA, a novel, content-based approach to detecting phishing web sites, based on the TF-IDF information retrieval algorithm. We also discuss ...
Keywords: anti-phishing, phishing, evaluation, TF-IDF, toolbar

12 published by ACM
May 2007 ACM Transactions on the Web (TWEB): Volume 1 Issue 1, May 2007
Publisher: ACM
Bibliometrics:
Citation Count: 211
Downloads (6 Weeks): 19,   Downloads (12 Months): 122,   Downloads (Overall): 4,704

Full text available: PDFPDF
Service-Oriented Architecture (SOA) provides a flexible framework for service composition. Using standard-based protocols (such as SOAP and WSDL), composite services can be constructed by integrating atomic services developed independently. Algorithms are needed to select service components with various QoS levels according to some application-dependent performance requirements. We design a broker-based ...
Keywords: service selection, service oriented architecture (SOA), End-to-end QoS, Web services, service composition

13
October 2006 ICEBE '06: Proceedings of the IEEE International Conference on e-Business Engineering
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 3

Accountability benefits the Service-Oriented Computing (SOC) with trust and error reasoning. In this research, we study an accountability model with 3-D approach: Detect, Diagnose, and Defuse, to discover and eliminate the root cause of problems when violations of SLA (Service Level Agreement) occur in business processes. Our basic approaches are: ...

14
June 2006 CEC-EEE '06: Proceedings of the The 8th IEEE International Conference on E-Commerce Technology and The 3rd IEEE International Conference on Enterprise Computing, E-Commerce, and E-Services
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 2

Reputation systems for e-commerce uses past behaviors as a predictor of future behaviors. Reputation systems must meet the challenge on how to differentiate honest feedbacks from dishonest ones in order to reduce the system vulnerablity due to malicious attacks. To address this issue, we propose a distributed reputation and trust ...

15
June 2006 CEC-EEE '06: Proceedings of the The 8th IEEE International Conference on E-Commerce Technology and The 3rd IEEE International Conference on Enterprise Computing, E-Commerce, and E-Services
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

In the future, there may be a large number of Web Services available in the world. A user will want to have an efficient and effective way to identify the appropriate Web service(s) to satisfy his needs. This paper describes several strategies, including backward service discovery using set overlapping, backward ...

16
June 2006 CEC-EEE '06: Proceedings of the The 8th IEEE International Conference on E-Commerce Technology and The 3rd IEEE International Conference on Enterprise Computing, E-Commerce, and E-Services
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 2

The privacy issue for QoSWeb services is considered. As more Web services are constructed and deployed, many of our personal needs may be served by more than one service providers regardless of their platforms and implementation technologies. Service selection is performed by comparing the QoS attributes of all candidate services. ...
Keywords: Web Service, QoS, privacy, service selection, utility function

17
November 2005 Middleware'05: Proceedings of the ACM/IFIP/USENIX 6th international conference on Middleware
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Distributed real-time and embedded (DRE) applications possess stringent quality of service (QoS) requirements, such as predictability, latency, and throughput constraints. Real-Time CORBA, an open middleware standard, allows DRE applications to allocate, schedule, and control resources to ensure predictable end-to-end QoS. The Real-Time Specification for Java (RTSJ) has been developed to ...
Keywords: real-time CORBA, RTSJ, DRE, design patterns, middleware

18
November 2005 Middleware '05: Proceedings of the ACM/IFIP/USENIX 2005 International Conference on Middleware
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 0,   Downloads (12 Months): 0,   Downloads (Overall): 170

Full text available: PdfPdf
Distributed real-time and embedded (DRE) applications possess stringent quality of service (QoS) requirements, such as predictability, latency, and throughput constraints. Real-Time CORBA, an open middleware standard, allows DRE applications to allocate, schedule, and control resources to ensure predictable end-to-end QoS. The Real-Time Specification for Java (RTSJ) has been developed to ...
Keywords: RTSJ, DRE, design patterns, middleware, real-time CORBA

19
August 2005 RTCSA '05: Proceedings of the 11th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 6

The Real-time Specification for Java (RTSJ) offers the predictable memory management needed for real-time applications, while maintaining Java�s advantages of portability and ease of use. RTSJ�s scoped memory allows object lifetimes to be controlled in groups, rather than individually as in C++. While easier than individual object lifetime management, scoped ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us