%0 Conference Paper %B 2nd international conference on Security of information and networks %D 2006 %G eng %T How to apply CBR methods in Web service composition?