The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Research in the field of Trust Management is blooming producing new Trust Frameworks within short time intervals. However, trust researchers do not develop distributed systems. Most developers are not familiar with security procedures and therefore often introduce other security vulnerabilities during implementation. We wish to provide a solution for system designers and developers for applying Trust...
With the goal of accomplish the ubiquitous intelligence in social life, Cyber-Physical Systems (CPS) are getting growing attentions of researchers and engineers. However, the complexity of computing and physical dynamics bring a lot of challenges in the development of CPS, such as integration of heterogeneous physical devices, system verification, security assurance, and so on. A general or unified...
This paper reports on the activities and findings from the 5th and 6th international workshops on adoption-centric software engineering (ACSWE), which were held in 2009 and 2010, respectively. The two workshops had a common theme of migrating to SOA. The overall goal of the workshops was to distill lessons learned from SOA migration case studies and experience reports from several application areas.
With the development of the university digitalized campus and widespread using of information systems, how to solve the sharing and interoperation of data between different departments and existing systems has become a new requirements of the development. Web Services has excellent characteristics like portability, loose coupling and Scalability, it can achieve the sharing and interoperation of data...
This paper introduces an approach to realize service-oriented architecture (SOA) governance using a messaging network. The proposed solution uses a messaging network with a structured overlay. The messaging network is XML-based, and is an actual implementation of a content-based network. The proposed scheme provides a network-centric approach to ensure SOA governance by use of a common proactive scheme...
SOA have been deployed as a mean to offer a better flexibility, to increase efficiency through reuse of services and also to improve interoperability by providing new opportunities to connect heterogeneous platforms. However, those benefits make security more difficult to control. Fortunately, new standards are proposed to treat this issue, but their current use makes the architecture much more complex...
With the development of Chinese industry, it is more and more important that information infrastructure as the mean to bring together different software applications is the key technology to enable cooperation and information and knowledge exchange in an open industrial environment. In order to resolve the deficiency of traditional enterprise application integrity, this article describes the business...
This position paper proposes a research agenda for the field of security testing. It gives a critical account of the state of the art as seen by a practitioner and identifies questions that research failed to answer so far, or failed to answer in such a way that it would have had an impact in the real world. Three categories of research problems are proposed: theory of vulnerabilities, theory of security...
Due to the increasing complexity of Web systems, security testing is becoming a critical activity to guarantee the respect of such systems to their security requirements. To challenge this issue, we rely in this paper on model based active testing. We first specify the Web system behavior using IF formalism. Second, we integrate security rules -modeled in Nomad language- within this IF model using...
We propose an approach to generate and execute tests of the conformance of a system to a given security policy. The method is rule-based: it generates test cases directly from a security policy expressed as a set of security requirements, using two relations: one between predicates appearing in the rules and elementary test cases, called tiles, used to test predicates in the system, and another one...
The UNICORE grid system provides a seamless, secure and intuitive access to distributed grid resources. In recent years, UNICORE 5 is used as a well-tested grid middleware system in production grids (e.g. DEISA, D-Grid) and at many supercomputer centers world-wide. Beyond this production usage, UNICORE serves as a solid basis in many European and International research projects and business scenarios...
Collecting data on user activities is one of the fundamental middleware services in Web-enabled systems. The collected data is analyzed and used by various high-level services, like user profiling, accounting, security auditing, and system health monitoring. In this paper, we present architecture and performance evaluation of usage tracking components for service-oriented middleware systems. Presented...
This is an introduction to the proceedings of the MWS 2007 workshop held at EDOC 2007. It first explains the motivation for and background of the workshop. Then, it contains a short description of the keynote, each long and short peer-reviewed paper, and the discussion session "impact of various execution environments on middleware for web services". After the closing statements, MWS 2007...
Information privacy is usually concerned with the confidentiality of personally identifiable information (PII), such as electronic medical records. Nowadays, Web services are used to support different applications which may contain PII, such as healthcare applications. Thus, the information access control mechanism for Web services must be embedded into privacy-enhancing technologies. Further as application...
Current fashion systems to interconnect large software architectures are moving toward SOA based solutions. This new paradigm for designing system can be improved, in our opinion, by using semantics. Semantics can a play a main role in boosting interoperability thanks to current technologies to express knowledge and to describe semantic Web services (SWS). This paper tackles the provision of a Software...
Many Web services are expected to run with high degree of security and dependability. To achieve this goal, it is essential to use a Web-services compatible framework that tolerates not only crash faults, but Byzantine faults as well, due to the untrusted communication environment in which the Web services operate. In this paper, we describe the design and implementation of such a framework, called...
The Open Distributed Processing Reference Model (ODP-RM) provides viewpoints and abstract infrastructure guidelines that can be used for a basis for enterprise architecture, especially for an inter-enterprise architecture. The ODP-RM does not prescribe methodology for modeling itself, but provides common vocabulary and focus for description. This paper performs a brief analysis of the ODP-RM (and...
We developed a quality of service (QoS) management system to support service level management (SLM) for global enterprise services. The QoS management system is integrated with one of our enterprise services in a preproduction system, an identical system as the production system but in a test environment. Lab experiments showed that our integrated solution helps global enterprise services to better...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.