The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet of Things (IoT) is a technological revolution which provides the vision of connected world of Things. But varieties of technological challenges are there which restrict its full adoption in our day to day life. Among them Privacy and security are the area of major concern in IoT. This paper focuses on the communication with RESTful web services via mobile client in the context of IoT. For...
Security is not taken into account by default in the Representational State Transfer (REST) architecture, but its layered architecture provides many opportunities for implementing it. In this paper, a security mechanism for Web Service communication through mobile clients devices is proposed, that conforms to the REST architecture as much as possible. This approach has been inspired by some known...
This paper discusses XML security key technologies related with security of Web. Based on these discussions, Web service will be integrated with mature security architectures such as PKI (Public Key Infrastructure), XADES (Xml Advanced Electronic Signature) and VPN (Virtual Private Network). A new architecture (called SWSSA for Simple Web Service Security Architecture) to secure SOAP messages exchange...
An aggregated privacy-preserving identity verification scheme is proposed for composite Web services. It aggregates multiple component providers' interactions of identity verification to a single one involving the user. Besides, it protects users from privacy disclosure through the adoption of zero-knowledge of proof of knowledge. This approach can dramatically reduce the computation time, independently...
In this paper, a comprehensive Quality of Security Service (QoSS) model for addressing security within a Service-Oriented Architecture (SOA) is proposed. We define a detailed SOA security model that supports and incorporates a number of networking security techniques and protocols. It utilizes symmetric keys, public keys and hash functions techniques, in order to provide different levels of QoSS agreements...
Traditional formal methods for analyzing security protocols have gained great success to find attacks or prove their absence in the standard Dolev-Yao model. However, they cannot be applied directly to verify Web services protocols because of their inherent different message syntax. In this paper, we apply our justification-oriented and automatic formal approach again to verify directly security properties...
Service aggregation is becoming a cost-effective and time-efficient way for a business to develop new applications and services. While it creates tremendous opportunities in various industry sectors, its cross-organization nature raises serious challenges in the security domains for authentication. In this paper we formulate a formal definition of authentication in service aggregation and a security...
Web service protocols are designed in XML formats so the message structures within are quite different from the conventional protocols. Therefore, the traditional formal verification techniques which have gain substantial achievements in practice, cannot be applied directly to them because their underlying models are written in Alice\Bob-style descriptions using high-level message formats instead...
Web service is a rapidly emerging paradigm for application integration in complex service environments. However, it is facing security issues. On the basis of studying Web service security standards, this paper gives out a schema of duplex signature based on SAML token. It can be safely used in the Web service composition system and reduce system management costs.
Packet classification (PC) is one of the core technologies for next generation network service. The goal is to classify packet into different ??flow?? and classification result can be applied in differentiated service. Though many multi-dimensional classifications have been put forward, few of them could accomplish fast search speed, low storage requirements and fast updates at the same time, especially...
Web Services have become a viable component technology in distributed E-commerce platforms. Due to the move to high-speed Internet communication and tremendous increases in computing power, network latency has begun to play a more important role in determining service response time. A new model of distributed E-commerce architecture was presented for Web Technology, which aimed at integration and...
This paper deals with a lightweight implementation of the eXtensible Messaging and Presence Protocol (XMPP) protocol for the Contiki operating system, offering a standardized, open, web-service like architecture, as opposed to existing technologies which lack proper open architecture. To achieve our objective, our implementation is based on the Internet Protocol version 6 (IPv6) and XMPP. Until recently...
Although Web service already can be implemented by decentralized control, its publication and discovery with universal description, discovery and integration for Web service is still based on a centralized structure. In this paper, we propose a new mechanism for decentralized Web service by employing the efficient dynamics performance of semantic Web and the efficient online explore capabilities of...
Web services technology is considered a key enabler for NEC. However, existing Web service protocols are designed for use over the Internet, and cannot necessarily be directly applied in military tactical networks where bandwidths are low and communication disruptions are frequent. In this paper we present a novel prototype proxy solution which adds both delay and disruption tolerance to SOAP. The...
A primary problem for the security of web service is how to precisely express and match the security policy of each participant that may be in different security domain. Presently, most schemes use syntactic approaches, where pairs of policies are compared for structural and syntactic similarity to determine compatibility, which is prone to result in false negative because of lacking semantics. In...
The WS-BPEL specification focuses on business processes the activities of which are assumed to be interactions with Web services. However, WS-BPEL processes go beyond the orchestration of activities exposed as Web services. There are cases in which people must be considered as additional participants to the execution of a process. The inclusion of humans, in turn, requires solutions to support the...
Cryptographic protocols are crucial for securing electronic transactions. The confidence in these protocols can be increased by the formal analysis of their security properties. Although many works have been dedicated to standard protocols like Needham-Schroeder very few address the more challenging class of group protocols. We have introduced in previous work a synchronous model for group protocols,...
Countless challenges to preserving a userpsilas location privacy exist and have become more important than ever before with the proliferation of handheld devices and the pervasive use of Location-based Services. It is not possible to access Location-based services and, at the same time, to preserve privacy when the user provides his exact location information. To achieve privacy, most third party...
Dynamic composition of protocol features allows applications to establish connections with custom communication characteristics. Automatically computing possible compositions and checking given compositions requires a common framework for expressing application needs, service features, and system characteristics. In this paper, we present such a framework that is based on situation calculus. We show...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.