The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The usage of the internet consists of several fields e.g. business, social, government, education, and so on. In business, the internet is needed to connect producers with consumers. Consumers do not need to come to a place to buy some goods. Transactions can be done at home using an internet connection. One of the usage of Internet technology is a web service. The emerging of this technology as there...
E-commerce system design based on B / S structure gives us a lot of convenience, but it also brings security risks: the password is compromised or decoded. This paper presents a solution for rural e-commerce platform based on smart client security technology, it can not only increase the security of the system, but also has the characteristics of flexible operation. If a new type of rural e-commerce...
We present a solution for test-based security certification of services that models the service under certification using a Symbolic Transition System (STS). The STS-based model is readily derivable from the Web Service Description Language (WSDL) and Web Service Conversation Language (WSCL) of the service, and can be enriched with details about test-based conditions on inputs and outputs, implementation...
Since data sharing mechanism between the various business systems lacks of specification and standardization, information shares hardly and data exchange are inefficient, the paper proposes a data exchange platform for power enterprise based on ESB, which is based on SOA architecture, unified data exchange standards by using XML, used SOAP/HTTP(S) as the data transfer protocol between business systems...
With the development of the university digitalized campus and widespread using of information systems, how to solve the sharing and interoperation of data between different departments and existing systems has become a new requirements of the development. Web Services has excellent characteristics like portability, loose coupling and Scalability, it can achieve the sharing and interoperation of data...
Security is a very important requirement for any Web application. In order to avoid free-rider behaviors and reduce requesters' malicious accesses in Web services, a kind of trust management based on feedback and time decay in Web Services is presented in this paper. According to the service providers' feedback, honest accesses will be rewarded while dishonest ones will get punishment by such mechanism,...
Service Oriented Architecture (SOA) based on Web Services technology gained popularity because business work flows can easily be executed as an orchestration of Web Services. These Web Services are independently developed and may be internal or external. With increase in connectivity among the Web Services, security risks rise exponentially. Moreover the security requirements are not defined at organizational...
SOA concept of service-oriented architecture and related technologies are described in this paper. With the current development of computer technology, a software and hardware architecture design of product data management system is given, and it bases on object-oriented technology and distributed database technology with service-oriented, furthermore it includes the security architecture and education...
This paper seeks to integrate different impressive access technologies to build a kind of innovative mobile business model. It analyzes the requirements of mobile business in the age of the 3rd generation wireless communication infrastructure (3G), present a set of mobile business solution in which the second generation ID card in China is used instead of all kinds of the existing IC or ID card for...
The current financial supervision model of China is isolated supervision, and each financial supervision institution has its own financial supervision information system, which may lead to many problems like lacking comprehensive data, lacking unified platform and so on. A good way to solve these problems is to establish the financial supervision information system based on SOA. Web service is the...
B2B E-Business is becoming one of the most popular electronic business ways. Because of lacking a unified standard and solution of basic architecture and interface, traditional B2B E-Business system has many shortcomings, such as poor reusability and poor extensibility. In order to solve the problems, a B2B E-Business system model based on Web Service is proposed and analyzed. The model can build...
Grid computing technique is a mature technique for distributed-data computing and processing. Scientific workflow (SWF) technique is one of the most important parts of grid computing and typically used for job scheduling, distributed services invocation and distributed data processing. However, rare previous literatures studied the security issues of SWF in the design of scientific workflow though...
Along with the further improvement of Chinese medical aid system in 21st century, the system interface and security has been in front us. Web services are being positioned as the technological solution framework for achieving this aggregation in the context of cross-organizational business applications through the Internet. In such a context, security is currently one of the main concerns and several...
Security has become one of the biggest issues that slow down the progress of e-commerce. Web service is a key technology to achieve e-commerce. On the basis of research of the Web service standards and the features of e-commerce, this paper points out the inadequacies of current electronic commerce system and gives out a security model based on Web service. It can provide two-way authentication, which...
In view of the limitation of the traditional security technique in Web service (WS) session domain, it researched the session security management model based on Web service and analyzed the security specifications of WS-Security and WS-Conversation proposed by IBM and Microsoft. In combination with a specific E-Commerce project, it discussed the design of session security model, analyzed the process...
Web Services and workflow have been widely adopted in building complicated business systems. In these systems, high security concern is claimed. But frequent authentication and computing-intensive encoding and decoding operation bring extra workload to the systems and greatly impact the performance of Web Services and workflow engine, especially under heavy load. In this paper, we propose Requests...
A selection of an appropriate Web service can be viewed as a multi-criteria decision-making problem involving selection of multi-attribute candidate service from a set of available services. This selection should not be based on intuition but need thorough understanding of the decision problem and the process to prioritize the features and, hence services. This study proposes analytical hierarchy...
When database resources being integrated into the pervasive environment, the universal key problem to solve is access mechanisms of database security. The database security mechanisms have already been firmed in the database system. When more flexible security schemas to adapt to the pervasive environment are needed, the database system could solve the problem above insufficiently by itself. We could...
Business process management is designed to make business activity coordination easier and more cost effective. WS-BPEL and BPEL4People extension together coordinate the web services and human activities within business process. However, the increasing business integration and legal requirements raise the need for secure business processes. The openness and distribution nature of inter-organisational...
A business process is a collection of related structures and activities, undertaken by organizations in order to achieve certain business goals. The Web services-based business processes with a new set of protocols bring a new set of security challenges. As security has become an essential component for all software, several security solutions for XML and Web services have been proposed. In general,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.