The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The measure of similarity is necessary for the study of several problems such as: the multimedia adaptation, detection of intrusion based behavior, adaptation of web services.... In this article, we propose the definition of a new measure of similarity that deals with the shared objects properties, their values and the weight of each property is proposed.
If we minutely analyze our day to day life then we shall find that it consists of utilization of some resources that are needed for our survival. Cloud computing plays a major role in this orientation by providing different resources in the form of web services like tax calculation web service, stock information web service, e-banking web service etc; for the smooth running of our daily lives. But...
Recently, Web services security has shown a significant gesture as several specifications have been developed and implemented to meet the security challenges of Web services. However, the performance of the security mechanisms is fraught with concerns due to additional security contents in SOAP messages, the higher number of message exchanges to establish trust as well as extra CPU time to process...
Policy Enforcer is an online monitoring tool for detecting security violations in a multi domain environment where the network, system and service are the multiple domains. One can ensure security for a network service by protecting the sensitive resources at these three domains. This paper presents the various design issues of policy enforcer, which have the performance impact in terms of detection-rate,...
Exposing students to research topics enhances their learning experience. It is therefore desirable for instructors to include a research component into their courses. The courses most prone for incorporating research components are the upper level undergraduate and graduate courses. However, this becomes challenging in the case of introductory courses, where learning new programming skills is the...
Security policy validation based on conformance testing is a promising approach, but it lacks both of a fault model and of better test selection procedures. Penetration testing approaches rely on a fault model based on the exploitation of sequences of vulnerabilities. This document proposes a method to generate test purposes to validate the conformance of a system to a security policy using a fault...
Accelerated by the rapid deployment of distributed systems and the Internet, online collaboration and information sharing are pervasive in enterprise computing environment. With regard to the requirements of online collaboration and information sharing, authentication information needs flexible manipulation to facilitate federation across trust domains. To achieve identity federation for federated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.