Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The following topics are dealt with: distributed and parallel computing; semantic Web; mobile networks; peer-to-peer computing; sealable computing; Internet; opportunistic and delay tolerant networks; agent and dependable systems; intelligent computing; communication networks; service oriented architecture; security; wireless sensor networks; privacy; ad hoc networks; life science modeling and computing;...
Service-oriented architecture (SOA) is the premier application framework for integrating complex heterogeneous computing systems in business and government. To utilize SOA in sensitive military systems, however, the issue of multi-level security (MLS) must be addressed. MLS requirements call for strict separation and limit interaction between classification levels. However, many Web services and resources...
As both the Department of Defense and the Intelligence Community are moving toward service-oriented architecture (SOA), it is important to ensure that SOA-based systems can operate and exchange classified information across domain boundaries in support of support net-centric missions. The interplay between SOA and cross domain solutions (CDS) raise a number of challenges that are grounded in the inherent...
Nowadays, several network applications require that consumer nodes acquire distributed services from unknown service providers on the Internet. The main goal of consumer nodes is the selection of the best services among the huge multitude provided by the network. As basic criteria for this choice, service cost and Quality-of-Service (QoS) can be considered, provided that the underlying Service-Oriented...
Five properties of an architecture for secure access to web services are defined and two existing architectures are evaluated according to these criteria. References to these criteria in the literature and evaluation of the security architectures are tabulated in the conclusion. Policy-sufficiency is defined as the requirement that any meaningful statements can be expressed in policy definitions of...
Rigorously trusted services depend on reliable evidences to describe and check service behaviors. In this paper, we propose the pi-SOA framework, which delivers mutually trusted services in a rigorous way. The framework allows clients to verify service behaviors remotely according to their trust policies and uniquely identify the verified service at all times during its executions. On the other hand,...
Compared to other wired networks, complexity in the 3G UMTS is due its interactions with different entities. Within the UMTS, services have to deal with a great number of different QoS, small user display, variant bandwidth and small battery power. Most of the services are generally bind to the particular systems or APIs. In this article, we look at the evolution of different technologies on which...
In this paper we propose a convenient way to access and invoke UPnP services available in a remote network. UPnP was originally developed for use in a local and private network, however as there is a growing number of affordable mobile devices which can easily connect to the internet from any place in the world it is just the next step to demand secure access to the services running at home. Another...
The Internet of Things and Services is a rapidly growing concept that illustrates that the ever increasing amount of physical items of our daily life which become addressable through a network could be made more easily manageable and usable through the use of Services. This surge of exposed resources along with the level of privacy and value of the information they hold, together with the increase...
SOA provides an effective way for electronic commerce. On the basis of studying generic business and SOA security mechanisms, this paper points out the inadequacies of current electronic commerce system and gives out a electronic commerce security model based on SOA. It can provide a secure, compatible and extensible application for business process.
This article reports two techniques for building a high performance lossless service-oriented architecture (SOA). It employs a lossless ESB (enterprise service bus) and a lossless high performance transaction processing (database) cluster.
Service-oriented Architectures deliver a flexible infrastructure to allow independently developed software components to communicate in a seamless manner. In the scope of organisational workflows, SOA provides a suitable foundation to execute business processes as an orchestration of multiple independent services. Along with the increased connectivity, the corresponding security risks rise exponentially...
JXTA is an interoperable and platform independent peer-to-peer computing infrastructure. It is designed in a manner to address the needs of the widest possible set of P2P applications. In this paper, we propose SOS: a Service Oriented Architecture based on JXTA with semantic support. This contribution in regards to the existing platforms can be identified at three main levels: The architectural, resource...
This paper describes the experience of the University of Murcia in the design and development of security SOA infrastructures for electronic government, which provide university community with secure and interoperable services.
In recent years, the issues in web service security have been widely investigated and various security standards have been proposed. But most of these studies and standards focus on the access control policies for individual web services and do not consider the access issues in composed services. Consider a simple service chain where service s1 accesses s2, and s2, in turn, accesses service s3. The...
With the increased interest in the Web services composition, more and more enterprises and businesses depend on this paradigm. Open, distributed and dynamic properties of the schema, there is a pressing need for secure services in daily transactions. Orchestration and choreography language provide basic services standards and interaction, collaboration, and negotiation standards among services, but...
This position paper proposes a research agenda for the field of security testing. It gives a critical account of the state of the art as seen by a practitioner and identifies questions that research failed to answer so far, or failed to answer in such a way that it would have had an impact in the real world. Three categories of research problems are proposed: theory of vulnerabilities, theory of security...
Due to the increasing complexity of Web systems, security testing is becoming a critical activity to guarantee the respect of such systems to their security requirements. To challenge this issue, we rely in this paper on model based active testing. We first specify the Web system behavior using IF formalism. Second, we integrate security rules -modeled in Nomad language- within this IF model using...
Web services technology is a burgeoning technology that has received tremendous amount of attention in the software industry in recent years under the broader umbrella of service-oriented architecture (SOA). It is fast becoming an important emerging technology that utilizes the power of the Web to produce an integrated, interoperable solutions based on standard Web protocols that are easy to consume...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.