Methodology and tools for end-to-end SOA security configurationsFumiko SatohMichiaki Tatsuboriet al.2008SERVICES 2008Conference paper
Business value assessment of packaged applicationsChunhua TianShun Jianget al.2008SERVICES 2008Conference paper
Anti-patterns: Integrating distributed and heterogeneous data sources in SOAsHakan Hacigümüş2008SERVICES 2008Conference paper