The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet of Things (IoT) is a technological revolution which provides the vision of connected world of Things. But varieties of technological challenges are there which restrict its full adoption in our day to day life. Among them Privacy and security are the area of major concern in IoT. This paper focuses on the communication with RESTful web services via mobile client in the context of IoT. For...
Using one password for all web services is not secure because the leakage of the password compromises all the web services accounts, while using independent passwords for different web services is inconvenient for the identity claimant to memorize. A password manager is used to address this security-convenience dilemma by storing and retrieving multiple existing passwords using one master password...
The popularity of web services has largely influenced the way in which enterprise business is conducted. Since web services enable easy accessibility of data, dynamic connections, and relatively less human interventions, ensuring confidentiality and integrity of data that is transmitted via web services protocols becomes more significant. If a single service does not fulfill the service consumer requirements,...
There is a wealth of research on web service attack types and different techniques to mitigate them. However, there is little discussion on reusable methods for implementing these known techniques. In this paper, we introduce two handler architectures that can be reused to implement a broad set of known attack countermeasures. While structurally similar, the architectures differ in the information...
In a services computing environment, a large amount of sensitive data is hosted by service providers. As the owners of data might have different security requirements for their data, many systems allow each data item to have its own access control policy. For privacy and security reasons, some data owners and clients might want their access control policies and credentials to remain secret to the...
In this paper, we propose a security framework, looking at different policies for data access control in the mobile environments. We have started with extending the Platform for Privacy Preferences (P3P) policy for controlling the data access. The aim is to modify the P3P policy and to use it in the security capsule of a mobile handset. The service provider can publish the P3P policy in the WebServices...
To achieve the goal of e-commerce of Linyi Mall, this paper proposes an SaaS-based online mall trusted platform architecture. Platform uses SOA technology. Business lease e-commerce services required through the Internet to the online mall platform. This paper also studied the customer data security and credibility in the SaaS platform. Platform uses access control technology and information encryption...
Web services are now widely used in web-based applications. To protect the information in web services, many security specifications have been proposed. Attribute-based Encryption (ABE) provides us a brand new cryptographic primitive for access control. This paper sets out to examine an unexplored area to date - how attribute-based encryption might be used to provide privacy and security for web services...
Many security-critical web applications, such as online banking and e-commerce, require a secure communication path between the user and a remote server. Securing this endto- end path is challenging and can be broken down into several segments. The network part between the user's machine and the server is usually well protected, using secure communication protocols, such as the Transport Layer Security...
The essay based on the XML (Extensible Markup Language) achieves a technical level which is cross-platform, cross-system, and cross-application without linking to language combining the practical requirement of current E-government and the development of Web Services. Then establishing a data sharing based on the application in heterogeneous platform of E-government focus on Web Service and right-flow,...
As services themselves and computer resources of cloud services become increasingly non-local, accountability to users for the results and implementation status of the service have emerged as important issues. This paper gives a detailed overview of what would be required to (1) link log data for multiple services supported by non-local servers and (2) trace cloud-based services, focusing on prevailing...
Web-based systems are now widely used in many fields. Users are usually required to conduct identity authentication separately when logging in different systems before getting service. For the sake of security, it is improper to use a global identifier and password among several systems. Many approaches are proposed to solve the problem, among which single sign-on (SSO) is most popular schema with...
Information is an irreversible general trend of social and world economy's development. E-government means to make full use of information technology to enhance the effective management of the government, in order to promote transformation of government functions and improve management level. However, e-government faces with some problems, such as security issues. First, this paper analyzes the characteristics...
Grid is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations.?? The dynamic and multi-institutional nature of these environments introduces challenging security issues that demand new technical approaches. In particular, one must deal with diverse local mechanisms, support dynamic creation of services, and enable dynamic creation of trust domains...
This paper presents a service that provides security through the technology of Web services. The use of web services to provide security in e-learning systems will complement the features of services developed in language and/or different architectures. Thus, our work is not limited to platforms in which the client (e-learning system) was developed, since this service is provided on a flexible, scalable...
Service-oriented architecture provides flexible methods for systems development and integration. It is widely adopted in Web services. On the basis of studying service-oriented architecture and Web service security standards, this paper proposes a method for accessing trusted services based on service-oriented architecture and gives out a system implementation model.
Recently, Web services security has shown a significant gesture as several specifications have been developed and implemented to meet the security challenges of Web services. However, the performance of the security mechanisms is fraught with concerns due to additional security contents in SOAP messages, the higher number of message exchanges to establish trust as well as extra CPU time to process...
This paper discusses the challenges faced by large engineering firms in organizing and analyzing vast amounts of diverse geospatial data to support complex engineering projects worldwide. For Bechtel, the implementation of an enterprise GIS has greatly facilitated spatial data sharing and utilization, but has required much forethought and planning in the architectural design, standards and tools required...
New Web technologies, such as the semantic Web and the social Web, have changed the way services and information are accessed. These new technologies allow more usable and interoperable services to be realized. They help service providers to reach more individuals. Automatic service discovery and invocation can also benefit from these technologies.Unfortunately, several threats to security, privacy,...
A major advantage of service-based computing technology is the ability to enable rapid formation of distributed computing systems by composing massively available services over various types of networks. Their confidentiality and privacy should be well protected under various situations. This paper proposed a control-based approach to balance the trade-off between security and performance of adaptive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.