The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Contract in service commerce is crucial. Contract signing can be time consuming and costly process, especially if buyer and seller are far from each other. This problem can be solved by using digital signature. We propose a method for contract signing which can be proved with signer identity card. Using this method, buyer and seller can check and signed their document conveniently using web application...
Business processes are most widely used industry oriented approaches for service composition. These are capable of solving complex issues in grid computing, cloud computing and heterogeneous networks. Business process can develop and deploy the workflow design with the help of BPEL language. These business processes are lacking into security aspects such as, encryption, decryption, authentication,...
This paper focuses on analysis of a nuclear power group to headquartered brand as the core, to surrounding radiation entire range of video monitoring system of distribution and the management current situation, according to the system's architecture features and user requirements, and based on the use of WPF and Web Service technology, it had proposed and constructed a new integration method and integration...
Because of the openness and anonymity of the Internet, there are inevitably many security risks on the Internet. The security core of WEB services is identity authentication and data security. Traditional WEB services are built on IPSec and SSL, which could not fully meet the security needs of WEB services. This paper firstly introduces the relevant circumstances of eID, and then proposes a security...
We present a Peer-To-Peer (P2P) Digital Resource Management (DRM) system for video content in this paper. The encryption arithmetic of our system is flexible and is careless in this paper. Encryption algorithm of high intensity as bilinear mapping is acceptable and Encryption algorithm of low intensity is OK. Meanwhile the security of our system is based on the structure of the system and illegal...
This paper introduced a practicable method to connect web portal with campus-user information system, via a Web Service-based SSO (Single Sign-on) system, in order to realize the sharing of users' statuses and information. Cookies, after being serialized into binary array and encrypted with RSA, will be transmitted in the Web Service framework. Then this array will be deserialized when Identity Server...
Cloud computing is an emerging computing paradigm in which IT resources and capacities are provided as services over the Internet. Promising as it is, this paradigm also brings forth new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are likely outside of the same trust domain of data owners. To maintain the confidentiality of,...
Through the research of the existing security mechanisms and security technologies, combined with the actual security requirements of Web communications, this paper proposes a Web services security communication model. The model not only can meet the basic requirements for secure communications, and can achieve better results in the Web service application with higher security requirements. Compared...
The collision is an attempt to shut down the port access system in the sequence composition, that is, a specific port connection requests. Port collision technology is a server device to allow the user in accordance with the agreed sequence of collisions, open a server port agreed to provide services technology.
Many security-critical web applications, such as online banking and e-commerce, require a secure communication path between the user and a remote server. Securing this endto- end path is challenging and can be broken down into several segments. The network part between the user's machine and the server is usually well protected, using secure communication protocols, such as the Transport Layer Security...
OPC Unified architectures (OPC UA) is a new software interface specification and application framework based on web service for plant automation systems which communicate with each other over the internet. The security issue holds the key to its development for technology feature based on web service. In this paper, the OPC UA security issues are discussed from the two views of network environment...
The security of Web service has been paid more attention with the increasing E-business nowadays. Therefore, a method was explored to establish a secure Website by using Apache and OpenSSL. During the process, the article use EtherPeek program and compare the two different Tele-com effect while launching the safety module or not to achieve a safe communication.
To prevent file transmission in the electronic military affair system from being damaged. Methods: security mechanisms of Web service based on J2EE platform, system security based on RSA algorithm, and the basic principle of digital signature. Procedure: to explain definition, characteristics and structure of the electronic military affair system, and to analyze its design process and security. Conclusion:...
Developing P2P programs should be simplified further and the security and controllability of P2P applications should be strengthen. We design a P2P-oriented secure service platform which consists of three modules: Control Center Overlay Network (CCON), Tracker Overlay Network (TON) and Sharing Server Clusters (SSC). CCON and TON are organized by Distribute Hash Table (DHT) and SSC is hided behind...
With the development of remote sensing technology, the use of remote sensing images collected by space platforms is becoming more and more pervasive. There is more and more need to distribute processing of remote sensing images. At present, WebService can figure out non-security remote sensing images network processing, but due to network transmit without non-encryption at client side, which may lead...
An authentication system based on trusted platform is presented in distributed network, network nodes are distributed in each domain, the domain authentication server based-TPM granted a certificate to each trusted member of domain and authorize trust token to access network source in different domain, in this paper, many security technologies are applied, member with trust token can span domain boundaries,...
The purpose of CEDA (certified electronic document authority) is to guarantee reliability and stability of electronic documents. When using storage and issuance services which are one of core services offered by CEDA, users register their electronic documents and they are issued to a third party later on. In this process, issuance of partial information (part page) instead of the entire registered...
The research project aims at designing and implementing a Web based wireless mobile system security and privacy framework that is centered on the concepts of ubiquitous healthcare services provided to the patients in rural or remote areas from distant hospitals. With this system framework, a physician can securely access and carry the patient information from a mobile device, update the patient information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.