The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One of the main concerns of Cloud storage solutions is to offer the availability to the end user. Thus, addressing the mobility needs and device's variety has emerged as a major challenge. At first, data should be synchronized automatically and continuously when the user moves from one equipment to another. Secondly, the Cloud service should offer to the owner the possibility to share data with specific...
Protecting (authorizing) access to individual web services has been explored in many research efforts. The focus of such research is to ensure that authorized users with appropriate credentials are able to access resources under controlled and authorized security. However, integrating and/or composing such services, e.g. through workflow environments in collaborative environments, remains an open...
In recent years, security attacks on the web have been perpetrated by hacker activist organizations that aim to destabilize (using different techniques) web services in a specific context for which they are motivated. Predicting these attacks is an important task that helps to consider what actions should be taken if the attack is latent. Although there are applications to detect security threats...
The usage of the internet consists of several fields e.g. business, social, government, education, and so on. In business, the internet is needed to connect producers with consumers. Consumers do not need to come to a place to buy some goods. Transactions can be done at home using an internet connection. One of the usage of Internet technology is a web service. The emerging of this technology as there...
Nowadays, many services in the internet including Email, search engine, social networking are provided with free of charge due to enormous growth of web users. With the expansion of Web services, denial of service (DoS) attacks by malicious automated programs (e.g., web bots) is becoming a serious problem of web service accounts. A HIP, or Human Interactive Proofs, is a human authentication mechanism...
The European VPH-Share project develops a comprehensive service framework with the objective of sharing clinical data, information, models and workflows focusing on the analysis of the human physiopathology within the Virtual Physiological Human (VPH) community. The project envisions an extensive and dynamic data infrastructure built on top of a secure hybrid Cloud environment. This paper presents...
Pervasive applications promote a seamless integration of computer artifacts with our daily an business lives. However, they threaten privacy in two ways. Firstly, adaptation to a user's context necessitates a large collection of data. Secondly, context should be addressed when granting users access to information. This paper handles privacy management as an access control problem and argues that privacy...
Reputation systems offer web service consumers an effective solution for selecting web service providers who meet their Quality of Service (QoS) expectations. A reputation system computes the reputation of a provider as an aggregate of the feedback submitted by consumers. Truthful feedback is clearly a pre-requisite for accurate reputation scores. However, it has been observed that users of a reputation...
The support for non-functional concerns (NFC) is essential for the success and adoption of web services. However, state of the art works offer only a limited support for these concerns especially when it comes to the composition of multiple non-functional concerns with composite web services. In this paper, we focus on the composition of non-functional actions (NFA) with composite web services whose...
In this paper, we specify a global service level guarantee including not only QoS but also security and taking into account user mobility. This global service level could be guaranteed within several autonomic computing systems managed by different autonomic domain managers. For that purpose, we propose an end-to-end Service Level Negotiation Protocol, called SLNP, to provide those autonomic managers...
The emergence of the Internet has changed the nature of face-to-face towards online interactions. This leads to the concept of virtual interoperation such as Web Services, Grid, and Cloud Computing. Since existing security mechanisms are insufficient to cover the diversity of workflow application domains, trust is considered as an adaptive, high-level abstraction, and platform-independent solution...
Service Oriented Infrastructures including Grid and Cloud Computing are technologies in a critical transition to wider adoption by business. Their use may enable enterprises to achieve optimal IT utilization, including sharing re-sources and services across-enterprises and on-demand utilization of those made available by business partners over the network. This paper presents a selection of common...
Policy-based management can simplify web service management by establishing policies to control various activities involved in service governance and provision. Administrators and users use policies to define control rules and restrictions, and to configure application environments. When collaboration is necessary between web services for a specific task, various management requirements from individual...
The Internet of Things is a rapidly growing concept in recent years. It refers to the idea that every physical thing in this world can be also connected to the Internet as well as computers. As the development of embedded systems, computing, and networking, the growing number of physical objects in our daily life become addressable through a network, however, more and more resources along with privacy...
Trust is an important factor to predict the behaviour of a Web Service and as a criterion for Web Service selection. Although considerable research has been performed in the offline and online worlds, analysis of trust in the Web Services environment has been limited. Most trust studies in Web Services are focused on trust establishment without identifying and considering the main trust definition...
Service-oriented Architectures support the provision, discovery, and usage of services in different application contexts. The Web Service specifications provide a technical foundation to implement this paradigm. Moreover, mechanisms are provided to face the new security challenges raised by SOA. To enable the seamless usage of services, security requirements can be expressed as security policies (e...
Vulnerability detection tools are frequently considered the silver-bullet for detecting vulnerabilities in web services. However, research shows that the effectiveness of most of those tools is very low and that using the wrong tool may lead to the deployment of services with undetected vulnerabilities. In this paper we propose a benchmarking approach to assess and compare the effectiveness of vulnerability...
The adoption of WSPL as a language for expressing Web service policies has shown its adequacy. The expressivity and simplicity of that language were the key factors behind this success. A desired feature in specifying Web services policies is the introduction of the context concept. In fact, very often Web service designers look for expressing rules that depend on the context in which a Web service...
Mobile agents play a key role in many researches on non-fixed services composition, but threats from potentially malicious hosts become a great obstacle of services composition based on mobile agent technology because an agent on a malicious host is in a white-box attack context. A security framework based on bilinear pairings on elliptic curves using a special digital signature technique and a multi-recipient...
This paper presents a methodology to perform passive testing of behavioural conformance for the web services based on the security rule. The proposed methodology can be used either to check a trace (offline checking) or to runtime verification (online checking) with timing constraints, including future and past time. In order to perform this: firstly, we use the Nomad language to define the security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.