The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The efforts and findings of the last decades of research on the formalization and the verification of Web services have given a certain level of assurance on Web services. However new challenges such as high availability and security issues are not fully addressed. In fact, Web services are exposed to attacks that appear continuously. These issues have naturally paved the way to a new research topic...
Information and communication systems have several security vulnerabilities. In addition, conventional security software requires tuning effort and may not be able to detect many web attacks. For this reasons, security becomes a worldwide objective to many technological systems including Learning Management Systems (LMSs) such as Moodle. In this work, we propose a secured multi agent system (MAS)...
Malware distribution using drive-by download attacks has become the most prominent threat for organizations and individuals. Compromised web services and web applications hosted on the cloud act as the delivery medium for the exploits. The exploits included often target the vulnerabilities within the plugins of the web browsers. Implementing security controls to counter the exploits within the browsers...
Service Oriented Architectures are nowadays used in a wide range of organizations to support critical daily operations. Although the underlying services should behave in a secure manner, they are often deployed with bugs that can be maliciously exploited. The characteristics of service-based environments open the door to security challenges that must be handled properly, including services under the...
Ultra high energy cosmic rays are the most energetic particles in the universe. They are measured to have energies of up to and occur at a rate of about once per square kilometer per century. To increase the probability of detecting one of these events, a huge detector covering a large area is needed. The Pierre Auger Collaboration build up an observatory covering 3000 square kilometers...
Developers often rely on penetration testing tools to detect vulnerabilities in web services, although frequently without really knowing their effectiveness. In fact, the lack of information on the internal state of the tested services and the complexity and variability of the responses analyzed, limits the effectiveness of such technique, highlighting the importance of evaluating and improving existing...
The adoption of Service Oriented Architectures (SOAs) in a wide range of organizations, including business-critical systems, opens the door to new security challenges. Although the services used should be secure and reliable, they are often deployed with security bugs that can be maliciously exploited. The problem is that developers are frequently not specialized on security and the common time-to-market...
The price and size reduction of computational devices have increased the number of areas where human-operated equipments are replaced by autonomous and autoconfigurable devices. The IP protocol has taken place in industrial and home automation, specially in wireless applications. It allows applications to use interoperable communication strategies commonly used in the computer networks as the Web...
Considering numerous of credible problems takes place in the distributed, loosely coupled, flexible and dynamic Web service environment because many factors, such as service provider, service user and service quality and so on, is uncertain, which all these problems exited lead the normal running of system to face serious threats. Therefore, this article, through processing the user feedback information...
In this paper, we propose an event-based framework that allows to specify and reason about the monitoring properties during composition process execution. The proposed approach is highly expressive and allows to specify monitoring properties that can be based on either functional or non-functional requirements, allows multi-level detection of any violation, allows to calculate effects of any such...
Web services are often deployed with critical software bugs that may be maliciously exploited. Developers often trust on penetration testing tools to detect those vulnerabilities but the effectiveness of such technique is limited by the lack of information on the internal state of the tested services. This paper proposes a new approach for the detection of injection vulnerabilities in web services...
Today, many scientific disciplines heavily rely on computer systems for in-silico experimentation or data management and analysis. The employed computer hard- and software is heterogeneous and complies to different standards, interfaces and protocols for interoperation. Grid middleware systems like UNICORE 6 try to hide some of the complexity of the underlying systems by offering high-level, uniform...
The ITSM implementation within small enterprises has its own characteristics. Based on the service life-cycle concept from ITIL v3, and taking into account the characteristics of small enterprise IT services and 3rd party ITSP operation, this paper designed an implementation model for integrated IT services. This model is further designed by tailoring the IT service management system, and integration...
As Cloud Computing begins to move beyond the pure hype stage and into the beginning of mainstream adoption, adopting cloud-based services or moving application services to the cloud brings a number of new risks, including: Cloud availability, Cloud security, Erosion of data integrity, and so on. However, for enterprise which require visibility, trust and control over cloud-based services. To maximize...
Trust is an important factor to predict the behaviour of a Web Service and as a criterion for Web Service selection. Although considerable research has been performed in the offline and online worlds, analysis of trust in the Web Services environment has been limited. Most trust studies in Web Services are focused on trust establishment without identifying and considering the main trust definition...
Web services composition design, verification and monitoring are active and widely studied research directions. Little work however has been done in integrating these related dimensions using a unified formalism. In this paper we propose a declarative event-oriented framework, called DISC, that serves as a unified framework to bridge the gap between the process design, verification and monitoring...
In Service Oriented Architecture, Quality of Service (Qos) represents an important issue which is often considered when selecting and composing services. For receiving up-to-date information, non-functional properties can be continuously monitored using current methods. Because of the occurrence of monitoring at every time of service calling, the current methods imposes some overhead on the SOA. The...
The system utilizes the object-oriented analysis method and the broad-based B / S / D software architecture. Then researching and developing the coal mining security equipment's intelligent monitoring and management system of being based on the web-environment, the Web server software on this system using the tomcat6.0. Connecting the database by struts and ibatis dynamic web page technology and framework...
People in rural areas are less likely to obtain broadband Internet access due to a combination of economic disadvantage, technical difficulties, and lack of service providers. There is a great need to develop robust, low-cost and easy-to-maintain network management platform for Wireless Internet Service Providers (WISP) in rural areas. The goal of this project is to partner with a small local start-up...
Intelligent connected devices become a more vital part of our lives. In contrast to prior years, today embedded systems and devices are loosely coupled and cooperate with each other according to changing objectives. Following the service-oriented architectural style, the approach of so called device-based service systems emerges. The challenge is to build and manage these systems in a reliable, secure,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.