The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Researchers are making secure multiparty computation--a cryptographic technique that enables information sharing and analysis while keeping sensitive inputs secret--faster and easier to use for application software developers.
To achieve the goal of e-commerce of Linyi Mall, this paper proposes an SaaS-based online mall trusted platform architecture. Platform uses SOA technology. Business lease e-commerce services required through the Internet to the online mall platform. This paper also studied the customer data security and credibility in the SaaS platform. Platform uses access control technology and information encryption...
Web-based systems are now widely used in many fields. Users are usually required to conduct identity authentication separately when logging in different systems before getting service. For the sake of security, it is improper to use a global identifier and password among several systems. Many approaches are proposed to solve the problem, among which single sign-on (SSO) is most popular schema with...
The first edition of Java (both the language and the platform) was released in 1995, which contained the all-or-nothing security access model. A mid-1997 paper I published in IEEE Micro laid out a vision for the future of Java security, which notably included a model for fine-grained access control, a crypto architecture, and a number of other security mechanisms. The first implementation of these...
Service-oriented architecture provides flexible methods for systems development and integration. It is widely adopted in Web services. On the basis of studying service-oriented architecture and Web service security standards, this paper proposes a method for accessing trusted services based on service-oriented architecture and gives out a system implementation model.
The evolution of wireless networks and mobile devices has resulted in increased concerns about performance and security of mobile payment systems. In this paper we propose SA2pMP, a lightweight secured architecture for two-party mobile payments. SA2pMP employs a lightweight cryptography scheme that combines public key and symmetric key cryptography systems (ECDSA and AES), as well as a multi-factor...
A grid portal is one of the most important ways to access grid systems. The disadvantages existing in current grid portals are that they are designed for specific applications, difficult to add new applications. Besides, the security issues are not considered fully in these portals. In this paper, we proposed a user-centric and secure grid portal architecture-USGPA based on portlet. In USGPA, a security...
Name Services for the Internet of Things (specifically, the EPCglobal Network) are distributed systems that serve the following fundamental lookup function: Given an identifier for a real-world object, e.g., an Electronic Product Code (EPC), they return a list of Internet addresses of services, which offer additional information about this object. Without name services acting as a broker between items...
On the basis of analyzing the requirements to the security of collaborative commerce system based on service oriented architecture, a security solution which can solve the security problem is proposed. The solution includes some technologies such as XML encryption, authority access control, signatures and intrusion detection, etc.
Self-managing systems are the focus of an increasing research activity since can provide a more robust way of building software artifacts. In this paper, we focus on self-managing systems for adapting the security concern. Providing security as a one-size-fits-all solution results in a system that is far too rigid to accommodate the needs of different application domains. Security mechanisms can depend...
A multiagent system (MAS) architecture is structured in terms of autonomous and communicating components. Agent orientation does not support the modularization of some system properties that affect several system components. These properties are called ldquocrosscutting concernsrdquo and need to be explicitly captured in the architectural design of MAS. Aspect-orientation provides abstractions to...
In this paper, it first analyzes the present security protocol for mobile communications. Furthermore, a security framework for the Mobile E-Service is proposed. In the mean time, using the inherent security and expansibility of J2ME, we design a security message flow model to support communication protocol for the Mobile E-Service Oriented Architecture (MSOA), which emphasizes the authentication...
Over recent years there has been increased level of discussion on utility pricing for software. The focus of these discussions is to create new operating cost models where the unit costs are directly tied to the business operations to which they contribute. While creating a fine-grained operating cost model is very important for software solutions such as SaaS, the anticipated technology platforms...
The current business environment has become still more demanding in which organizations are under increasing pressure not only to increase revenue but also to respond quickly to changing market conditions. These organizations shall only be successful if they transform themselves and adapt on demand businesses paradigm. There is constant demand for innovation and shorter time to market for products...
Most of the current research and development results dealing with security of mobile agents describe solutions only for usage of mobile agents. These contributions usually assume agents posses unique and recognizable identities, cryptographic keys, assigned assurance level, and various other security parameters. But, very few papers describe how to create, classify, and evaluate mobile agents before...
It is commonly recognized that today's Internet routing and addressing system is facing serious scaling problems, which are mainly caused by the overloading of IP address semantics. That is, an IP address represents not only the location but also the identity of a host. To address this problem, several recent schemes propose to replace the IP namespace in today's Internet with a locator namespace...
The construction and effective application of net based educational resources are of great importance for e-learning. SOA (service oriented architecture) enables the reuse and share of net based educational resources by publishing the resources as web services. However, frequent identity authentications in resources access among different providers take up overfull system resources and lower the implementation...
The mobile network operators (MNOs) would like to ensure the high level of security of their services to their customers without any inefficiency and protect their own business models from any adversary. However, due to the constraints of the mobile handsets, the dreams had seemed to be difficult to be realized till now. As the 3G mobile network has spread out widely and the technologies of smart...
Usage control is the field of security which deals with the issue of access decisions on a client platform which is outside the domain of the original owner. These issues include digital rights management, privacy issues and concepts such as content redistribution. UCON is a highly expressive usage control model, which significantly enhances traditional access control models through decision continuity...
Workflows in the physical world are implemented based on forms printed on paper and signed by the involved people. In contrast workflows in service oriented architectures require a central entity for execution that results in an inflexible system design that is not suitable for ambient environments. Based on an ambient environment example a security approach for decentralized workflows is presented...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.