The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
If we minutely analyze our day to day life then we shall find that it consists of utilization of some resources that are needed for our survival. Cloud computing plays a major role in this orientation by providing different resources in the form of web services like tax calculation web service, stock information web service, e-banking web service etc; for the smooth running of our daily lives. But...
With the aim for promoting separation of crosscutting concerns, the notion of aspects are currently introduced throughout the lifecycle of software development, even to other domains. Many aspects are found, designed or implemented thereby. As the concrete specification and implementation mechanisms vary greatly among aspects, it is relatively complex and difficult to compare them. This paper provides...
The Securities Technologies (ST) Workshop for WETICE 2008 accepted two papers as full papers for this year's workshop. The committee received a total of eight papers for the ST workshop. The two papers did cover quite interesting topics and provided some good discussion.
Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified...
This paper presents a course model for teaching component-based software development (CBSD) in the software engineering undergraduate curriculum to deepen and broaden student comprehension of component software. All hands-on lab practices are designed with open-source software tools. The course endows students the precious experiences of making design decisions via comparative study, risk analysis,...
The UNICORE grid system provides a seamless, secure and intuitive access to distributed grid resources. In recent years, UNICORE 5 is used as a well-tested grid middleware system in production grids (e.g. DEISA, D-Grid) and at many supercomputer centers world-wide. Beyond this production usage, UNICORE serves as a solid basis in many European and International research projects and business scenarios...
This is an introduction to the proceedings of the MWS 2007 workshop held at EDOC 2007. It first explains the motivation for and background of the workshop. Then, it contains a short description of the keynote, each long and short peer-reviewed paper, and the discussion session "impact of various execution environments on middleware for web services". After the closing statements, MWS 2007...
Privacy helps to establish personal autonomy and create individualism. Privacy is a state or condition of limited access to a person. In particular, information privacy relates to an individual's right to determine how, when, and to what extent information about the self will be released to another person or to an organization. It can be said that privacy is a much broader concept than security; privacy...
Current fashion systems to interconnect large software architectures are moving toward SOA based solutions. This new paradigm for designing system can be improved, in our opinion, by using semantics. Semantics can a play a main role in boosting interoperability thanks to current technologies to express knowledge and to describe semantic Web services (SWS). This paper tackles the provision of a Software...
In this paper we discuss the use cases for monitoring of Web services for compliance with policies and service level agreements. In particular, the quality of service associated with Web service interactions and its monitoring rely on the proper use by both parties of related Web service protocols. This monitoring is best served by an event-centric model and an extensible scripting language, such...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.