The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To overcome the current cybersecurity challenges of protecting our cyberspace and applications, we present an innovative cloud-based architecture to offer resilient Dynamic Data Driven Application Systems (DDDAS) as a cloud service that we refer to as resilient DDDAS as a Service (rDaaS). This architecture integrates Service Oriented Architecture (SOA) and DDDAS paradigms to offer the next generation...
A good and robust integration system cannot be separated from how the initial design of the system is selected and implemented. Therefore, integrating existing systems to become a large system that meets the needs of other connected systems requires full assessment and verification so that when the system is implemented, the necessary changes required in the future will be able to be accommodated...
Nowadays, web service selection has become a very challenging issue. As the number of web services is increasing drastically, different QoS parameters are added in their description in addition to their functional parameters (Inputs and outputs) to distinguish them and ease their selection. Hence, web service selection consists to find out among services having the same functionalities the optimal...
A service-oriented architecture (SOA)-based application is composed of a number of distributed and loosely-coupled services which are interconnected to accomplish a more complex functionality. The main security challenge in SOA is that we cannot trust the participating services in a service composition to behave as expected all the time. Moreover, the chain of all services involved in an end-to-end...
Service-oriented architecture (SOA) is an architectural paradigm that advocates composition of loosely-coupled services in order to construct more complex applications. The agility and complexity of modern web services on one hand and the arbitrary interconnections among them on the other hand, make it difficult to maintain a sustainable trustworthiness in long-running SOA-based applications. Moreover,...
This paper studies heuristic search-based optimization of service compositions. We have investigated applying Genetic Algorithms (GA) to optimize service-oriented architectures (SOA) in terms of security goals and cost, we help software Engineers to map the optimized service composition to the business process model based on security and cost. Service composition security risk is measured by implementing...
This work contains the implementation of techniques and recommendations OWASP on a SOA prototype developed with J2EE. To its design and coding we used some WS-Security specifications, Metro framework, MVC as architectural pattern, Facade and DAO as design patterns. The prototype was validated in terms of design, coding and security through some tools such as: Structural Analysis for Java, SonarQube,...
Personal health records (PHRs) have received increased attention in the health care industry. PHR systems allow individuals to collect, store, use, and share all or part of their medical records, lab results, medications, and self-entered health information. Today PHRs are provided by a broad array of players, including health care providers, health plans, employers, and technology vendors. Many existing...
In most cases, web applications communicate with web services (SOAP and RESTful). The former act as a front-end to the latter, which contain the business logic. A hacker might not have direct access to those web services (e.g., they are not on public networks), but can still provide malicious inputs to the web application, thus potentially compromising related services. Typical examples are XML injection...
The concept of cloud computing can be traced back to almost the middle of last century. Cloud paradigm offers scalable, portable, platform-independent, ubiquitous, shared resilient, sustainable, and near-utility computing. The cloud computing is implemented as a software-only solution or based on advanced hardware supported virtualization technology. This paper presents the fundamental technology...
Tactical networks are constrained networks that may transition between ad-hoc and mesh configurations and are characterised by frequent disruptions, changes in connectivity, and available resources. Whilst deploying a service-oriented architecture (SOA) allows the efficient provisioning of services at the tactical level, the existing resource limitations and potential attacks, require the dynamic...
RGSS-Negotiation is a Repaired Genetic Security Service Negotiation approach. Security as a non-functional requirement for web service is an important trend. This is due to the different levels of security the consumer and the provider demand or supply. In a web service negotiation, researchers negotiate QoS objects (attributes). Negotiating security levels is not addressed so far. In this paper,...
Service Oriented architecture is a trending standard for the development of software based on services. Generally a self-standing function is considered as a service. The Service interoperability is a serious issue between different organizational databases due to numerous heterogeneities among different services. In the Existing system, the Department of Civil Supplies and Consumer Affairs does not...
The accelerating progress of network speed, reliability and security creates an increasing demand to move software and services from being stored and processed locally on users' machines to being managed by third parties that are accessible through the network. This has created the need to develop new software development methods and software architectural styles that meet these new demands. One such...
Protecting Web applications is increasingly important due to their high popularity and wide adoption. Therefore, a multitude of protection techniques emerged in effort to secure Web applications, specifically considering valuable and private data commonly processed by such applications. Based on an overview of currently existing protection techniques, a generic and extensible PHP-oriented protection...
Web services provide functionalities to the users. Software products and services require high quality. Quality parameters of Web and cloud based applications includes scalability, balancing workload, high availability and other parameters. The objective of the paper to improve the performance of web in cloud based applications. Cloud based applications provide services to the users such as platform...
Traditional monolithic services fail to scale efficiently when a certain task within the service is flooded. They also have a long software release cycle due to the system complexity. Microservices, as a new architectural style, are built upon the idea of breaking a large service into a set of single-responsibility (along with other properties) services that are communicating over network. In such...
In this work, we focus on the SOPL approach (Service Oriented Product Line) which can be used in various domains where SOA based applications are needed such as e/m government, e-business, e-learning and so on. This approach is a combination of Service-Oriented Architecture (SOA) and Software Product Line (SPL). Ensure secure services are vital in order to establish trust between users and service...
Service Oriented Architectures have been increasingly evaluated and applied within military networks. However, existing implementations tend to overlook the constraints of the tactical environment, generating unsuitable requirements of network resources. The ongoing TACTICS project aims to study these constraints and propose solutions suitably adjusted to the tactical ecosystem. Under this scope,...
The "Future Internet Services and Applications" (FISA) track focuses on three complementary aspects that have to be considered while setting up future Internet services: (i) their modeling, provisioning and management, (ii) data protection, and (iii) data collection, storage and analysis. FISA is in its second edition and results from the fusion of the PASCS (Privacy and Accountability for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.