The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data privacy and security continues to hinder wider adoption of cloud based web services for small to medium businesses. Existing privacy aware systems for cloud environments either assume that web service providers are trustworthy and can adequately enforce a client's privacy policies or adapt computationally expensive encryption techniques to minimize data security risks. In this paper, we propose,...
With the growth of Internet in many different aspects of life, users are required to share private information more than ever. Hence, users need a privacy management tool that can enforce complex and customized privacy policies. In this paper, we propose a privacy management system that not only allows users to define complex privacy policies for data sharing actions, but also monitors users' behavior...
With the advent of IoT (Internet of Things) age, considerable web services are emerging rapidly in service communities, which places a heavy burden on the target users' service selection decisions. In this situation, various techniques, e.g., collaborative filtering (i.e., CF) is introduced in service recommendation to alleviate the service selection burden. However, traditional CF-based service recommendation...
Privacy is an important issue that has raised particular concerns among many research areas. This issue dramatically increases with the proliferation of the Web services composition paradigm. This is mainly due to the high dynamism and untrustworthiness characteristics of the services to be composed, which impose high levels of risk on the interacting parties. Existing technologies for managing and...
Most modern Web applications depend on the integration of code from third-party providers, such as JavaScript libraries and advertisements. Because the included code runs within the page's security context, it represents an attractive attack target, allowing the compromise of numerous Web applications through a single attack vector (such as a malicious advertisement). Such opportunistic attackers...
Most of the modern health-related information is collected, maintained, and accessed through computerized systems. However, the interaction with this information needs to comply with the U.S. federal regulations such as the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Due to the complexity of healthcare regulations, it's not easy to deploy a complaint system, especially for...
Data as a Service (DaaS) builds on service-oriented technologies to enable fast access to data resources on the Web. However, this paradigm raises several new privacy concerns that traditional privacy models do not handle. In addition, DaaS composition may reveal privacy-sensitive information. In this paper, we propose a formal privacy model in order to extend DaaS descriptions with privacy capabilities...
Data as a Service (DaaS) builds on service-oriented technologies to enable fast access to data resources on the Web. However, this paradigm raises several new concerns that traditional privacy models for Web services do not handle. First, the distinction between the roles of service providers and data providers is unclear, leaving the latter helpless for specifying and verifying the enforcement of...
The following topics are dealt: cyber engineering; human space computing; distributed networks; security and privacy; heterogeneous wireless networks; resource management; security in wireless systems; web services; web and mobile applications; data models and query processing; performance evaluation and testing; SOA and embedded systems; middleware; cloud computing; RFID; wireless sensor networks;...
By analyzing the characteristics of data sharing between Web applications and the limitations in existing data sharing methods, a new solution for data sharing between Web applications is presented. This data sharing solution transfer data between Web applications directly and provides a much better data sharing experience for the users. We explained this new solution in details from three key aspects...
Today, most Internet users are worried about protecting their personal information, which may be gathered by Web services. This concern can have a profound influence on finding a way for applying privacy-aware policies on Web services. In this regard, there are just a few accessible Web services on the Web, which usually provide users with simple operation and are not able to apply the user preferences...
Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.