
Naser Nematbakhsh- PhD
- Professor (Assistant) at Shahid Ashrafi Esfahani University, Esfahan, Iran
Naser Nematbakhsh
- PhD
- Professor (Assistant) at Shahid Ashrafi Esfahani University, Esfahan, Iran
About
101
Publications
14,827
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
520
Citations
Introduction
Current institution
Shahid Ashrafi Esfahani University, Esfahan, Iran
Current position
- Professor (Assistant)
Publications
Publications (101)
In this work, we show how to discover a semantic web service among a repository of web services. A new approach for web service discovery based on calculating the functions similarity. We define the Web service functions with Ontology Web Language (OWL). We wrote some rules for comparing two web services` parameters. Our algorithm compares the para...
In this work we propose a new approach for semantic web matching to improve the performance of Web Service replacement. Because in automatic systems we should ensure the self-healing, self-configuration, self-optimization and self-management, all services should be always available and if one of them crashes, it should be replaced with the most sim...
The recommender system's performance needs to be improved more than ever by increasing computer systems' usage in various applications. Recommender systems are a valuable tool in e-commerce websites. Their primary purpose is to generate accurate forecasts to access information in less time and energy for end-users. Classification optimizes informat...
The recommender system's performance needs to be improved more than ever by increasing computer systems' usage in various applications. Recommender systems are a valuable tool in e-commerce websites. Their primary purpose is to generate accurate forecasts to access information in less time and energy for end-users. Classification optimizes informat...
Cardiovascular disease is one of the most common causes of mortality in the world. Among the different types of this disease, the coronary artery is the most important, which the correct and timely diagnosis of which is vital. Diagnostic and treatment methods of this disease have many side effects and costs. The best and most accurate diagnostic me...
Cardiovascular disease is one of the most common causes of mortality in the world. Among the different types of this disease, the coronary artery is the most important, which the correct and timely diagnosis of which is vital. Diagnostic and treatment methods of this disease have many side effects and costs. The best and most accurate diagnostic me...
The primary focus of academic centers is on their students' performance. They are attempting to identify affecting factors on the performance of students and provide an approach to improve the students' academic levels. Educational data mining is an emerging field of study. It helps academic centers to predict and evaluate their students' statuses...
In social networks, preserving privacy and preserving correlation among sensitive labels are a matter of trade-off. This paper presents a supervised anonymization technique, SNI (social network immunization), to publish social networks having multiple sensitive labels with correlation. SNI publishes all sensitive labels without distorting them. It...
له:
امروزه با پيشرفت علم و تكنولوژي يكي از دغدغه هاي آموزش و پرورش، ايجاد بستري مناسب جهت ايجاد محيط آموزشي و يادگيري هوشمند مطابق با فناوري هاي روز دنيا براي تربيت دانش آموزان در مدارس كه خانه دوم دانش آموزان است، مي باشد. هوشمندسازي مدارس بالاخص در مقطع پايه و ابتدايي و بهره گيري مدارس از فناوري اطلاعات مي تواند در سطح پيشرفت دانش آموزان تاثير ب...
Biological Data Mining presents comprehensive data mining concepts, theories, and applications in current biological and medical research. A potential disadvantage of data mining is volume and complexity of the results that can often be overwhelming. The construction of physical three-dimensional (3D) models of biomolecules can uniquely contribute...
Machine learning methods are often used to classify objects described by hundreds of attributes; however, as the dimensionality of the data rises, the amount of data required to provide a reliable analysis grows exponentially. A popular approach to this problem of high-dimensional datasets is to search for a projection of the data onto a smaller nu...
Biological networks provide a natural representation of complex biological systems and thus have been used in a variety of applications, from gene function prediction to identifying disease genes. Many biological research areas such as drug design require gene regulatory networks to provide clear insight and understanding of the cellular process in...
A significant aspect of Cloud-computing is scheduling of a large number of real-time concurrent workflow instances. Most of the existing scheduling algorithms are designed for a single complex workflow instance. This study examined instance-intensive workflows bounded by SLA constraints, including user-defined deadlines. The scheduling method for t...
A workflow model is the computerized representation of a business or scientific process. It defines the starting and ending conditions of the process, the activities in the process, control flow and data flow among these activities, etc. A partitioning method creates workflow fragments that group some of the workflow model elements (activities, con...
Data mining has been used as a public utility in extracting knowledge from databases during recent years. Developments in data mining and availability of data and private information are the biggest challenge in this regard. Preservation of privacy in data mining has emerged as an absolute prerequisite for exchanging confidential information in ter...
Although most research in density-based clustering algorithms focused on finding distinct clusters, many real-world applications (such as gene functions in a gene regulatory network) have inherently overlapping clusters. Even with overlapping features, density-based clustering methods do not define a probabilistic model of data. Therefore, it is ha...
In Wireless Sensor Networks (WSNs), the most important challenges are the bandwidth and energy limitations, network topology changes, and lack of fixed infrastructures. Flooding is a broadcasting method which is used in almost all existing routing protocols and suffers from the broadcast storm problem. It may result in excessive redundancy, content...
Using microarray techniques, it is possible to measure the expression levels of thousands of genes under several experimental conditions. Extracting information from microarray data is an important problem in Bioinformatics scope. Producing overlapping clusters is a major issue in clustering methods. While most of the research in this area has focu...
Increased intrusions into computer networks and cyber-attacks have rendered the immunization of cyberspace one of the most important issues of managers and experts in the recent years. Since cyber-attacks have become more sophisticated and hackers have become more professional, mere use techniques such as firewall, cryptography, biometrics, and ant...
Today, many tools for fast and easy access to information in social network have been introduced. The most important and popular tool of these tools is tag cloud. One of the most important issues that put up about tag clouds is how choose tag for tag cloud. Three approaches for determining how choosing tags have been proposed yet. One approach is b...
2014 © The author(s) 2013. Published with open access at www.questjournals.org ABSTRACT:-Nowadays, some special attributes of web services such as being independent from platform, reusability, having a loosely coupled architecture and the ability to compose together in contrast to other applications have made them as components enjoying the capabil...
Service-oriented architecture is an approach for making distributed systems that provide their services in the form of software applications. These services are called by other software and are used to make new services as well. Therefore, service quality is one of important issues in service-oriented architecture, whereas this issue has a consider...
ABSTRACT:-The value of quality parameters plays an important role in the customer's decision making when choosing a service. Monitoring of the parameters is carried out for achieving accurate and actual values of parameters. Because of monitoring carried out in every service callout, an overhead on the web service could be seen so that the values o...
Abstract
Mobile cloud computing has been created on mobile devices due to preexisting problems such as low ram memory, high consumption of batteries and low power of processor. By using the cloud technology mobile users are able to use heavy files, large applications and complex processing. Lack of bandwidth, it is necessary to invent a new system...
In large-scale pervasive computing environments, a huge amount of context is continuously created by context sources and as required by context consumers. Scalability is a challenge for managing and distributing this amount of data. In this research, a new scheme for context distribution is proposed which is based on forming context consumer commun...
Recently, a lot of research has been dedicated to optimizing the QoS-aware service composition. This aims at selecting the optimal composed service from all possible service combinations regarding user's end-to-end quality requirements. Existing solutions often employ the global optimization approach, which does not show promising performance. Also...
فایل پاورپوینت (اسلاید) جلسه دفاع کارشناسی ارشد رشته مهندسی نرم افزار
دانشجو: بهزاد سلیمانی نیسیانی (Behzad Soleimani Neysiani)
عنوان پایان نامه: ارزيابي کارايي چند پخشی جریان های ویدئویی زنده در شبکه های بزرگ مقیاس نظیر به نظیر
Title: Performance analysis of video stream broadcasting in large scale peer to peer networks
استاد راهنما: دکتر ناصر...
To realize smart home vision in an equipped domain, several types of context-aware applications should be deployed. Because of complex tasks of context gathering and processing, designing context-aware applications requires middleware support. Designing a context-aware middleware is a challenging issue because of specific characteristics of context...
UB ˙ ITAK doi:10.3906/elk-1105-49 Turkish Journal of Electrical Engineering & Computer Sciences h t t p : / / j o u r n a l s . t u b i t a k . g o v . t r / e l e k t r i k / Abstract: This paper addresses coalition formation, based on agent capabilities, centered on task allocation in emergency-response environments (EREs). EREs are environments...
In real pervasive computing environments, a huge amount of context is continuously created by context sources and required by context consumers. Scalability is a challenge for managing and distributing this amount of data. In this research, a new scheme for context management and distribution is proposed which is based on forming context consumer c...
Data integration is one of the main problems in distributed data sources. An approach is to provide an integrated mediated schema for various data sources. This research work aims at developing a framework for defining an integrated schema and querying on it. The basic idea is to employ recent standard languages and tools to provide a unified data...
In the recent years, multimedia streaming has been really popular among end users, especially live video streaming over the Internet. However, video streaming applications need efficient and reliable methods for disseminating video frames in the networks. Although Mesh-based Peer-to-Peer (P2P) networks make the system more robustness against link f...
پخش فیلم زنده در اینترنت برای جشنوارهها، مسابقات ورزشی و یا شبکههای تلویزیونی از اهمیت زیادی برخودار است. از طرفی به دلیل حجم زیاد اطلاعاتی که باید در اینترنت تبادل شود، متدها و ساختارهایی برای این منظور معرفی شده است که مهمترین ساختارهای معرفی شده درختی و توری شکل برای توپولوژی شبکه میباشند. همچنین متدهای پوش و پول و یا ترکیب آنها برای پخش جری...
در سیستمهای جریان نظیر به نظیر، روش پوش به سختی در توپولوژی نامنظم عمل میکند؛ گر چه انتقال دادهها سریعتر از روش پول انجام میشود اما چون گرهها به صورت تصادفی توزیع شدهاند، روش پوش معمولی موجب افزونگی بیشتری میشود. برای بهبود توانایی انتقال سیستم جریان نظیر به نظیر، طرح بررسی شده به بهبود برنامه کاربردی معمولی روش پوش در توپولوژی نامنظم میپر...
Web service technology (WST) is a service-oriented architecture implementation framework that makes designing component-based internet applications possible. At present, many providers offer their services as web services. Current WST suffers from the lack of an integrated tool to assist web service developers. In WST, the services are published pu...
Service-oriented architecture (SOA) is an important, flexible, and widely used software architecture. Web service technology (WST) is an SOA implementation framework that has attracted much attention. In WST, consumers find required services by means of service directories. Current service directories are mainly based on UDDI and suffer from a lack...
امروزه با رشد تکنولوژی و ظهور امکانات جدیدی از قبیل پخش زنده فیلم، مصاحبه آنلاین و سرویسهای مشابه، مدیریت ترافیک موجود در شبکه اینترنت به یکی از چالش های مهم تبدیل شده است. ارسال فیلم بصورت زنده در اینترنت و شبکه های بزرگ مقیاس از اهمیت زیادی برخوردار است بنابراین ارزیابی کارایی روش های چند پخشی فیلم در اینترنت یک چالش به حساب آمده که باید بتوان د...
Non-functional properties play an important role in all web service related tasks, especially in selection and composition of services. To select a service according to the user business policies, it is necessary to find a mechanism for matching the user business policies with the web service policies. To do this, exploiting semantic matching is ef...
In this paper a binary decision tree, based on Neural Networks, Support Vector Machine and K-Nearest Neighbor is employed and presented for recognition of Persian handwritten isolated digits and characters. In the proposed method, a part of the training data is divided into two clustersusing a clustering algorithm, and this process continues until...
در شبکههای کامپیوتری از متدهای پوش و پول جهت چند پخشی جریانهای ویدئویی استفاده میشود که متد پوش، نسبت به متد پول، جدیدتر میباشد اما باعث افزایش بار کاری شبکه و ترافیک شبکه در موارد خاص میشود بنابراین میتوان در برخی از ساختارهای شبکه مانند ساختار درختی، از روش پوش استفاده کرد و در ساختارهای دارای دور مانند مش، از روش پوش استفاده کرد. استفاده ا...
To realize smart home vision in an equipped domain, several types of context-aware applications should be deployed. Because of complex tasks of context gathering and processing, designing context-aware applications requires middleware support. Designing a context-aware middleware is a challenging issue because of specific characteristics of context...
Service is the core concept of future Internet that named Internet of Services. This concept refers to software components as well as processing capacity and any other resources that can be offered through the Internet. There is a need for a third party that make registering and searching services easy and feasible. Web Service Technology (WST) is...
يکي از مسائل پايه مدلسازي قابليت اطمينان، تناسب دادن بين مفاهيم انتراعي مسائل فني دنياي واقعي با مفاهيم کليدي سناريوهاي قابليت اطمينان و امنيت ميباشد که با تعريف کامپوننتها و نقصهاي سطوح مختلف سيستم سروکار دارد.
با توجه به اين شرايط، هر مدلسازي به عمليات منطقي، تأخيرها و اغلب برخي از شمارشها احتياج دارد. تمامي اين عملياتهاي پايه بوسيله يک نوع...
مدلهای قابليت اطمينان نرم افزار براي تخمين و پيش بيني قابلیت اطمينان نرمافزار استفاده ميشوند. ابزارها و تکنيکها براي انتخاب مدل قابليت اطمينان نرم افزار موجود در نوشتههای علمي، نميتوانند با سطح بالايي از اطمينان استفاده شوند زيرا آنها تعداد محدودي از ملاکهای انتخاب مدل را استفاده ميکنند.
در اين مقاله، مدلهاي قابليت اطمينان نرم افزار طبق چ...
Recently, a lot of research works have attempted to model the choreography of services by different languages. Each language models the choreography on the basis of different view and level of abstraction. The features of each language demonstrate how much it is suitable for service choreography modeling. Among all languages, WS-CDL is a popular la...
One of the important issues in computer networks is "Load Balancing" which
leads to efficient use of the network resources. To achieve a balanced network
it is necessary to find different routes between the source and destination. In
the current paper we propose a new approach to find different routes using
swarm intelligence techniques and multi c...
Business corporations usually require choreography of services to be dynamic and adaptable. One way for answering this demand is to develop the services having dynamic behaviours. However, it is not enough and their behaviours must be composed dynamically too. The current model such as WS-CDL has a static structure to specify choreography and is no...
In this paper, we addressed the problem of modelling complex cooperative multi-agent organizations. Proposed team-based model is inspired from the Schwaninger's model of intelligent human organizations. Considering time and agents' identity features is the main important factor in the mentioned model. In our considered problem domain, rescue system...
Software engineering is known as a problem solving activity and modeling. All the principles in software engineering are emphasized on the conditions for software producers are unpredictable because of the interactions and mutual relationships between all the factors involved in creating and those conditions never allow full control over this proce...
Postal code recognition can be an important step in the post offices automation. In this paper, a recognition system based on statistical and template matching approaches to recognize Persian handwritten postal codes on postal envelopes is presented. The system consists of pre-processing, feature extraction, and classification stages. Pre-processin...
In the past decade, significant advances have been gained in e-learning systems; nonetheless, learning management systems are not free of difficulties. As the most important of these problems it can be pointed out that there is no guaranty whether the actual student is present in the virtual classroom or not and also there is no way to track the st...
Proper organizational modelling is a challenging issue in complex cooperative multi-agent systems. In this paper, we propose a team-based multi-agent organizational model, based on the Schwaninger's model of intelligent human organizations. It provides an integrative framework to rapid task handling, the main effectiveness requirement in many appli...
Inter-organization business corporations demands applications and services to be dynamic and adaptable. One approach to cope with the increase changing in service-oriented application is developing the services having adaptive behaviors. However, just having such services is not enough and their behaviors must be tuned and configured when they comp...
WS-CDL is a very rich language that is specially designed to describe choreography of services. However it is very poor to adopt reusability mechanisms for making the choreography easy to design and confident to use. The main challenge is that there is no mechanism to make a reusable sub choreography which is able to expose an interface. Therefore,...
Several semantic image search schemes have been recently proposed to retrieve images from the web. However, the query context is regularly ignored in these techniques and hence, many of the returned images are not adequately relevant. In this paper, we make use of context to further confine the outcome of the semantic search engines. For this purpo...
In this paper, a complete system for detection and recognition of free format Persian handwritten zip codes was developed. Firstly, zip code localization includes of baselines detection, connected components segmentation and components' feature extraction, classification, and a novel algorithm presentation to detect zip code's place is performed. I...
In a multi-agent environment, the accomplishment of a task may necessitate the co-operation of a number of agents. In order to allocate a task to a group of agents, methods of coalition formation in multi-agent systems can be used. In multi-agents systems, the formation of an optimal coalition is one of the main challenges to be overcome. With incr...
With an expanding of Web services giving same functionalities, Quality of Service (QoS) is becoming an important criterion for selection of the best available service. So users need to know QoS information and the reliability of this information. This article presents a new model of reputation improved Web services discovery considering the quality...
In this work, we show how to discover a semantic web service among a repository of web services. A new approach for web service discovering based on calculating the functions similarity. We define the Web service functions with Ontology Web Language (OWL). We wrote some rules for comparing two web services parameters. Our algorithm compares the par...
Both Distributed Software Development (DSD) and eXtreme Programming (XP) approaches have gained significant Popularity. Both DSD and XP method are growing trends as software business requires quicker quality production at a cheaper price. Requirement Management (RM) is not easy to perform even under the best of circumstances and it becomes more dif...
Keyword based information retrieval has difficulties in retrieving relevant information because it is not able to include the semantics of queries. In this paper, we present a novel method for query expansion based on semantic relations. In our proposed algorithm, semantically related words to the query are extracted from WordNet. Valuable words am...
The main advantage of the web services technology is the possibility of preparing a compound web service with the existing to perform a proper task, but a service may be presented by several producers which one different in the quality of services. An adaptive process should select the elements of a compound web service in a way to answer effective...
Service-Oriented Applications (SOA) are being regarded as the main pragmatic solution for distributed environments. In such systems, however each service can response the user request independently, it is essential to compose them for supplying a compound value-added service. Since, there may be a number of compositions to create the requested serv...
Due to the outstanding progress in computer technology and an ever-rising demand for high-speed processing able to support the distributed mode there is an increasing trend towards the use of parallel and distributed systems. In addition, one of the important stages of any system utilizing parallel computing is the load balancing stage in which the...
Web services composition based on QoS is the NP-hard problem, so the bionics optimization algorithms can solve it well. On the other hand, QoS of compound service is a key factor for satisfying the users. The users prefer different QoSs according to their desires. We have Proposed the services composition algorithm based on quality of services and...
In this work we propose a new approach for semantic web matching to improve the performance of Web Service replacement. Because
in automatic systems we should ensure the self-healing, self-configuration, self-optimization and self-management, all services
should be always available and if one of them crashes, it should be replaced with the most sim...
Since using environments that are made according to the service oriented architecture, we have more effective and dynamic applications. Semantic matchmaking process is finding valuable service candidates for substitution. It is a very important aspect of using semantic Web Services. Our proposed matchmaker algorithm performs semantic matching of We...
Among many service choreography description languages, WS-CDL which has been developed by W3C is the most popular one. This language is an intermediate language mostly considered as a design language to describe the choreography, and is unable to model the choreography in high level. Regard to this issue, this paper proposes a set of notations, use...
Several methods and languages have been developed to describe computer system specifications and some of them have been deployed to validate and verify the functionality of the system. No one method is equally appropriate for all application domains. Service oriented architecture and using Web services is a wide growing domain of applications in so...
Web services choreography describes global model of services interactions among a set of participants. The correct description of choreography is very important, so before implementation upon choreography design description, we must be sure about correctness. Several techniques are employed to verify WS-CDL. In this paper we use a logical formal mo...
Noise reduction is a major concern in digital image processing systems, which have been investigated by several techniques. One kind of important noises in images is known as Salt & Pepper, which may have different causes. In this paper a new approach for eliminating this type of noise is presented. The approach is different from all previous works...
In this paper, a query planner is presented for semantic Web services. Semantic Web services represented in OWL-S format called OWL-S services. This planner converts OWL-S services to equivalent problem and domain descriptions that are specified in the planning domain description language PDDL. It invokes an efficient AI planner, fast diagonally do...
In this paper the matching model for semantic Web services is proposed to improve the performance of Web service discovery. This matching model includes two-phase method: semantic similarity matching and qualitative filtering. Semantic similarity matching used for matching algorithm in order to finding the most proper services, and qualitative filt...
The semantics-based Web service matching model is proposed in this paper to improve the performance of Web service discovery. Semantics-based Web service matching is a two-phase method including semantic similarity matching and qualitative filtering. Function-based semantic similarity matching used of matching algorithm in order to finding the most...
Traditional schedulers in the grid environment do not support semantic description of grid resources and jobs. They do exact matching between resource requesters and providers. These mechanisms are too restrictive because there is no prior agreement on how a resource or a service or a job will be represented. In this paper, we propose an extensible...
In this study, a formal model for specification of Access Control Policies (ACP) is represented. This model is capable of expressing several ACPs and combining them in a unified framework. We call present model Constrained Policy Graph (CPG), which is an extension of Take-Grant (TG) protection model. Although TG can be used to specify the ACPs but...
Data integration is one of the main problems in distributed data sources. An approach is to provide an integrated mediated schema for various data sources. This research work aims at developing a framework for defining an integrated schema and querying on it. The basic idea is to employ recent standard languages and tools to provide a unified data...
Web services are emerging technology for distributed computing and E-business interactions. A Web service represents a unit of business logic that an organization exposes on the World Wide Web. The next idea in Web service technology is the composition of Web services into complex ones and it has received much interest to support business-to-busine...
Web services are self-contained, modular units of application logic which provide business functionality to other applications via Internet connections. Several models have been used to compose Web services which are mainly served at specification level and provide static data dependent coordination processes. Hence they can not support reconfigura...
Software testing is one of the most important phases in the software development procedure which ensures the accordance of the software and its description. Testing is mainly a manual task accomplished by the human operators. This results in increasing the cost and time of the software development process. Also, due to the uncertain nature of the h...
Many definitive and approximate methods have been so far proposed for the construction of an optimal binary search tree. One such method is the use of evolutionary algorithms with satisfactorily improved cost efficiencies. This paper will propose a new genetic algorithm for making a near-optimal binary search tree. In this algorithm, a new greedy m...
Product line software engineering is an emerging software engineering paradigm, which guides organizations towards the development of products from core assets rather than from scratch. Various methods have been made to apply on the development of software product lines. However, using of them can be difficult and time-consuming without the aid of...
IP multicasting is a key technology for many existing and emerging applications on the Internet. Furthermore, with increasing popularity of wireless devices and mobile equipment, it is necessary to determine the best way to provide this service in a wireless environment. IETF Mobile IP, that provides mobility for hosts in IP networks, proposes two...
Multi-agent systems are used as a solution for complex and distributed systems. Since agents are autonomous they can be coordinated exogenously by a coordination language Reo. Reo coordinates agents without having any knowledge about agents. We apply organizational concepts to analyze and design such systems. In this paper, we propose a formal mode...
The area of agent-oriented methodologies is maturing rapidly and the time has come to begin drawing together the work of various research groups with the aim of developing the next generation of agent-oriented software engineering methodologies. An important step is to understand the differences between the various key methodologies, and to underst...
Multiagent systems are applied as a solution for distributed IT systems. Organizational concepts are usually applied to analyze and design such systems. Thus, a multiagent system can be seen as an organization which coordinates agent interactions. In this paper, we propose a formal model to specify the coordination behavior of a multiagent system o...
Numerous methodologies for developing agent based systems have been proposed in the literature. However, their application is still limited due to their lack of sufficient documents, tools and maturity. Tropos is one of the most accurate and complete agent oriented methodologies that have been proposed in recent years. Several developing tools are...
Classification of internet packets is a common task for internet routers. More rapid information transformation in communication
links requires better processing and classifying algorithms. This paper presents a novel classification algorithm for internet
packets profits parallel processing of neural networks. It is based on an extended able design...
Estimation of values of interval availability and associated uncertainties is becoming increasingly important with regard to high capital items of production such as off-shore oil production platforms. In the present paper earlier research using exponential distributions for both failure and repair is now extended to enable calculations to be carri...
Two models which enable availability to be calculated using observed data are given. The first is classical in nature and is appropriate for the calculation of interval availability. The second model is Bayesian and has particular relevance in assessing uncertainties involved with the prediction of instantaneous and asymptotic availability. Monte C...
Evaluation of performance of equipments or entire complexes of components assembled into systems has become increasingly important as a result of rapid technological progress and the need to evaluate reliability of such systems.
In the present paper a method for calculation of availability based on renewal theory is proposed. The availability is ex...
Dynamic service composition aims to create value-added services by selecting and combining existing services properly on demand. Basically, this research intends to select web services taking part in composition attention to both user query and service provider policy. The policy of service providers is represented and reasoned by SWRL language.
Most of the works done for specifying and analyzing the Access Control Polices (ACPs) consider the security policies per system while it is required to unify the security policies in an integrated system with several subsystems. Moreover, an important problem in web service composition is that the partners contributed in a combination may have inco...