The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper introduces an architecture offering authorization as a service for smart grids environments founding on the two standards XACML and SAML. A software prototype is deployed with the Platform as a Service (PaaS) framework Appscale. Appscale is an open source implementation of Google's App Engine framework enabling the execution of applications in a cloud environment without the need to take...
With the continuously development of nuclear power enterprise information, various application system of coupling degree become more and more high. On the analysis of traditional application integration technology, research and implement a integrated framework model between the nuclear power overhaul management system and other application system based on web service, to interact with the application...
A reputation service is an essential part of a reputation system, which collects, distributes, and aggregates feedback about service providers' past behaviour. The feedback, as a score, is given interactively or by a user or is derived from a monitoring process automatically. The reputation service accommodates for each service provider an accumulated score as its reputation, which is produced by...
A recent survey of the 451group on Cloud usage highlights software licensing as one of the top five obstacles for Cloud computing, quite similar to what has been observed in the Grid already a couple of years. The reasons are the same: the current praxis of software licensing, both in terms of business models and licensing technology. As a consequence, using commercial applications that require access...
Many research efforts are in progress for developing unified standards for Electronic Health Records. Such records can be shared for provisions of health care and research. Significant benefits can be realized when the proposed systems are used widely. Additional security requirements are crucial for their wide adoption. Patients want privacy and confidentiality. These systems will be deployed in...
In Web service ecosystems, business participants, such as service consumers, service providers and service marketplaces are required to form temporary collaborations to support virtual and dynamic business value networks. This requires participants in the collaboration to establish on-demand trust relationships (i.e. a trust federation) between each other and hence enable service sharing or consumption...
This paper introduces the design and realization of information service system based on the Internet and mobile communications. The system considers the short message processing as a Web Service located in a remote server. SMS Server as the client of this Web Service calls the services provided by the Web Service, special SMS Format is given, Ajax, Asynchronous Web Services and Multi-threading are...
A user's behaviour for using a specific web service on Internet, like her/his biometric information, can be used to identify the use. In many cases, the user behaviour represented as a set of attributes can be classified as either normal or anomalous. This value or in conjunction with other attributes of the user can be used to authorise the user of having access to the web service. To a certain extent,...
The Web 2.0 has changed the Internet landscape, users are no longer only consumers but now also producers of content. The increasing number of personal data published on Web Service Providers fathered a new kind of applications: the mashups. These third-party applications access users' information through service providers' APIs via secure authorization protocols such as OAuth. But these protocols...
Web information systems are now widely used. These systems generally provide specific service in accordance with users' identities. To use these services, users are required to conduct identity authentication separately when logging in different web applications and systems. For the sake of security and access control, it is infeasible to use a unique common identifier and password for all systems...
Due to the vulnerability caused by poor password selection it is very important to have a secure authentication and authorization infrastructure for Web based applications. In the current scenario it is very difficult to remember different passwords for different Web based applications. We propose centralized password based multiuser and multi-application single sign-on (SSO) framework for such applications...
In modern Grids, authentication is usually implemented via an X.509 PKI (Public Key Infrastructure). Proxy certificates are employed to facilitate interaction with the Grid, especially for purposes of delegation and single sign-on. We propose modifications to the Grid Security Infrastructure that allow reporting of proxy usage information to a database, giving the end user an opportunity to review...
The adoption of ID security authorization is the inevitable trend for the development of Web service security technology according to the requirement of diversification, integration and convenience for Web service. In this paper, a URL-based Web service unified ID authorization model is proposed based on the existent Web service security regulation firstly. Then the key technologies related with the...
In role based trust management, a trust domain will decide the trustworthiness of a user by assigning roles to the user according to submitted certificates. However, the userspsila trustworthiness should be different after they enforced different behaviors although being assigned the same role. A behavior-aware role based trust management model is presented in this paper. Role is extended to include...
One of the most significant difficulties with developing service-oriented architecture (SOA) concerns its security challenges. In particular, the authorization task is especially demanding because of the diverse access requirements within the various SOA environments, such as the business world, the academic setting and the industry atmosphere. In this paper, we propose a 4-attribute vector authorization...
This paper proposed a two layer authorization mechanism, including traditional password system and rhythm recognition. The whole system includes two phases: preprocessing and usual operation for users. In preprocessing phase, users type password in a specific rhythm in order to record and analyse the characteristics of behaviour of users. In the second phase, how to verify a user in usual operation...
The UNICORE grid system provides a seamless, secure and intuitive access to distributed grid resources. In recent years, UNICORE 5 is used as a well-tested grid middleware system in production grids (e.g. DEISA, D-Grid) and at many supercomputer centers world-wide. Beyond this production usage, UNICORE serves as a solid basis in many European and International research projects and business scenarios...
Accelerated by the rapid deployment of distributed systems and the Internet, online collaboration and information sharing are pervasive in enterprise computing environment. With regard to the requirements of online collaboration and information sharing, authentication information needs flexible manipulation to facilitate federation across trust domains. To achieve identity federation for federated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.