The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software-Defined Wireless Sensor Networking (SDWSN) is an emerging paradigm that seeks to alleviate the inherent resource constraint issues present in Wireless Sensor Networks (WSN) by adopting a Software-Defined Networking (SDN) approach to the management of WSN. This SDWSN paradigm is said to play a crucial role in both the developing Internet of Things (IoT) paradigm and the development of smart...
The Internet of things (IoT) is a rapidly evolving technology capable of transforming numerous areas of our lives. Smart Grid (SG) is one of such areas, which has an immense potential of development, following the advances in IoT technology. The goal of the current survey is to summarize the infrastructure and applications of IoT in SGs. The infrastructure aspect is described from the viewpoints of...
Recently, flexible networks contain various services designed and implemented by different vendors to accomplish specific tasks. Trust to security systems of such services is a significant challenge. In this paper, we propose a framework to assess trust to security systems of web services based on security policy specifications and security mechanisms running on flexible networks. The framework may...
This research developed the MySQL Sandbox, a secured environment for processing SQL queries. It was implemented as a RESTful web service having three services - sandbox database creation, SQL statement processing and sandbox database resetting. It supports the simultaneous processing of multiple SQL statements from multiple users in multiple databases. It uses question identification (ID) and student...
Neither provider nor user are willing to use Web services (WSs) technologies in sensitive domains without some measure of security. The users, on one hand, want to guard their personal information against unauthorized parties. While, the providers, on the other hand, wish to hide their trade secrets and internal know-how. In our previous works, we suggested the use of the Symbolic Observation Graph...
The efforts and findings of the last decades of research on the formalization and the verification of Web services have given a certain level of assurance on Web services. However new challenges such as high availability and security issues are not fully addressed. In fact, Web services are exposed to attacks that appear continuously. These issues have naturally paved the way to a new research topic...
In this paper we discuss how the web-service security can be checked using finite automata. We analyze existed attack patterns and discuss different representations for these patterns. We also consider automata equations in order to describe malicious inputs. We describe a class of such equations that have no solutions and provide some venues for a future work.
Interface automaton is a promising approach to model the temporal behaviors of system components, and its extension has been used to specify the security properties of component based systems. Currently, the formal properties of interface automata have not be certified with machine-checked proof by any proof assistant. In this work, we propose a Coq-library of interface automata which is developed...
Personal health records (PHRs) have received increased attention in the health care industry. PHR systems allow individuals to collect, store, use, and share all or part of their medical records, lab results, medications, and self-entered health information. Today PHRs are provided by a broad array of players, including health care providers, health plans, employers, and technology vendors. Many existing...
One of the main concerns of Cloud storage solutions is to offer the availability to the end user. Thus, addressing the mobility needs and device's variety has emerged as a major challenge. At first, data should be synchronized automatically and continuously when the user moves from one equipment to another. Secondly, the Cloud service should offer to the owner the possibility to share data with specific...
The use of digital content is increasing day after day and now it is an essential element of our day today life. The amount of stored information is so huge that it is highly difficult to manage the content especially in a distributed cloud environment. There are many open source software solutions available in cloud to handle huge amount of digital data. However none of these solutions addresses...
Internet of Things (IoT) is a technological revolution which provides the vision of connected world of Things. But varieties of technological challenges are there which restrict its full adoption in our day to day life. Among them Privacy and security are the area of major concern in IoT. This paper focuses on the communication with RESTful web services via mobile client in the context of IoT. For...
Information flow control (IFC) is useful in preventing information leakage during software execution. Our survey reveals that no IFC model is applied on the entire software development process. Applying an IFC model on the entire software development process offers the following features: (1) viewpoints of all stakeholders (i.e., customers and analysts) can be included and (2) the IFC model helps...
Today's modern information era society imposes great necessity of various software applications which now have an increasingly important impact on human life. The need for software applications and developers is rapidly increasing. To make up that demands enterprises have to make more applications in shorter time frames. Workload of software companies is constantly increasing, as they not only have...
Web services have been widely used in e-business, banking, and other online applications. web application architecture follows SOAP, UDDI and WSDL. QoS parameters are response time, availability, security and others are most significant for web applications. World into digital devices. the products can be used with efficient resource consumptions. Internet of things is the capability to connect every...
In this paper, we have tested several open source web applications against common security vulnerabilities. These vulnerabilities spans from unnecessary data member declaration to leaving gaps for SQL injection. The static security vulnerabilities testing was done in three categories (1) Dodgy code vulnerabilities (2) Malicious code vulnerabilities (3) Security code vulnerabilities on seven (7) different...
Web services provide functionalities to the users. Software products and services require high quality. Quality parameters of Web and cloud based applications includes scalability, balancing workload, high availability and other parameters. The objective of the paper to improve the performance of web in cloud based applications. Cloud based applications provide services to the users such as platform...
It is hard to guarantee proper protection in the Service Oriented Architecture (SOA), when a client outsources a part of its business or sends private data to a services provider. Various solutions proposed so far mostly require evidences of proper protection (e.g., source code for verification or execution traces for monitoring), which are to be provided by the service provider itself, and thus are...
Protecting (authorizing) access to individual web services has been explored in many research efforts. The focus of such research is to ensure that authorized users with appropriate credentials are able to access resources under controlled and authorized security. However, integrating and/or composing such services, e.g. through workflow environments in collaborative environments, remains an open...
To provide timely feedbacks to users, nearly every respectable Internet service now imposes a password strength meter (PSM) upon user registration or password change. It is a rare bit of good news in password research that well-designed PSMs do help improve the strength of user-chosen passwords. However, leading PSMs in the industrial world (e.g., Zxcvbn, KeePSM and NIST PSM) are mainly composed of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.