Search For:

Displaying 1-10 out of 10 total
Integrating Quality of Service Aspects in Top-Down Business Process Development Using WS-CDL and WS-BPEL
Found in: Enterprise Distributed Object Computing Conference, IEEE International
By Florian Rosenberg, Christian Enzi, Anton Michlmayr, Christian Platzer, Schahram Dustdar
Issue Date:October 2007
pp. 15
Developing cross-organizational business processes is a tedious task. The partners have to agree on a com- mon data format and meaning as well as on the Quality of Service (QoS) requirements each partner has to fulfill. The QoS requirements are typically d...
Bootstrapping Performance and Dependability Attributes ofWeb Services
Found in: Web Services, IEEE International Conference on
By Florian Rosenberg, Christian Platzer, Schahram Dustdar
Issue Date:September 2006
pp. 205-212
Recently, Web services gain momentum for developing flexible service-oriented architectures. Quality of service (QoS) issues are currently not part of the Web service standard stack, although non-functional attributes like performance, dependability or cos...
Web Service Indexing for Efficient Retrieval and Composition
Found in: E-Commerce Technology, IEEE International Conference on, and Enterprise Computing, E-Commerce, and E-Services, IEEE International Conference on
By Marco Aiello, Christian Platzer, Florian Rosenberg, Huy Tran, Martin Vasko, Schahram Dustdar
Issue Date:June 2006
pp. 63
The success and widespread use of Web service technology is bound to the availability of tools for rapidly discovering services and for composing their operations. We present a system for service discovery and composition based on syntactic and semantic ma...
Server-Side Bot Detection in Massively Multiplayer Online Games
Found in: IEEE Security and Privacy
By Stefan Mitterhofer, Christopher Kruegel, Engin Kirda, Christian Platzer
Issue Date:May 2009
pp. 29-36
One of the greatest threats that massive multiplayer online games (MMOGs) face today is botting, a form of cheating in which a player uses a script to automate actions in a game without actually playing. This has a severe adverse effect on honest players a...
Large Scale Web Service Discovery and Composition using High Performance In-Memory Indexing
Found in: E-Commerce Technology, IEEE International Conference on, and Enterprise Computing, E-Commerce, and E-Services, IEEE International Conference on
By Lukasz Juszczyk, Anton Michlmayr, Christian Platzer, Florian Rosenberg, Alexander Urbanec, Schahram Dustdar
Issue Date:July 2007
pp. 509-512
With the growing number and ubiquitous usage of Web services throughout the service-oriented community, the need to find service descriptions in a given repository, as well as composing them to a desired output, becomes a major issue in both research and c...
A Vector Space Search Engine forWeb Services
Found in: Web Services, European Conference on
By Christian Platzer, Schahram Dustdar
Issue Date:November 2005
pp. 62-71
As Web services increasingly become important in distributed computing, some of the flaws and limitations of this technology become more and more obvious. One of this flaws is the discovery of Web services through common methods. Research has been pursued ...
POSTER: Cross-platform malware: write once, infect everywhere
Found in: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (CCS '13)
By Juan Caballero, Christian Platzer, Martina Lindorfer, Matthias Neumayr
Issue Date:November 2013
pp. 1425-1428
In this ongoing work we perform the first systematic investigation of cross-platform (X-platform) malware. As a first step, this paper presents an exploration into existing X-platform malware families and X-platform vulnerabilities used to distribute them....
Vanity, cracks and malware: insights into the anti-copy protection ecosystem
Found in: Proceedings of the 2012 ACM conference on Computer and communications security (CCS '12)
By Christian Platzer, Gilbert Wondracek, Markus Kammerstetter
Issue Date:October 2012
pp. 809-820
Today, a large amount of software products include mechanisms to counter software piracy. However, most protection mechanisms can be easily circumvented by applying software patches (cracks) or license key generators (keygens) with seemingly no financial i...
Detecting malware's failover C&C strategies with squeeze
Found in: Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC '11)
By Christian Platzer, Matthias Neugschwandtner, Paolo Milani Comparetti
Issue Date:December 2011
pp. 21-30
The ability to remote-control infected PCs is a fundamental component of modern malware campaigns. At the same time, the command and control (C&C) infrastructure that provides this capability is an attractive target for mitigation. In recent years, mor...
Web service clustering using multidimensional angles as proximity measures
Found in: ACM Transactions on Internet Technology (TOIT)
By Christian Platzer, Florian Rosenberg, Schahram Dustdar
Issue Date:July 2009
pp. 1-26
Increasingly, application developers seek the ability to search for existing Web services within large Internet-based repositories. The goal is to retrieve services that match the user's requirements. With the growing number of services in the repositories...