The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Over the last fifteen years, Web applications have evolved from the early simple and hyper-text based ones into the more complex, interactive, usable and adaptive applications of the new generations. New paradigms, architectures, and technologies for developing Web-based systems continuously emerge and transform this specific context. At the same time, new techniques and tools for effectively testing...
Quality of Service (QoS) play very important role in web service recommendation system. The precision of service recommendation depends on the credible QoS. So people begin to find better method for calculating the credibility of QoS. We can count the execution result and user comment to calculate the QoS credibility of single web service. But how to calculate the QoS credibility of web service composition...
To realize commercial application of web services, its trust and reputation model has been raised into the agenda. And also many researches have been done on web services trust evaluation model. However, in practice there exist a few interferences to influence web service trust evaluation. For example, service providers may improve his own QoS level on purpose or giving vicious evaluation for his...
The measure of similarity is necessary for the study of several problems such as: the multimedia adaptation, detection of intrusion based behavior, adaptation of web services.... In this article, we propose the definition of a new measure of similarity that deals with the shared objects properties, their values and the weight of each property is proposed.
At present, the tourism change information management cannot be resolved efficiently and effectively, and this may cause tourists' travel to be out of order, leaving behind much pressure to transportation, scenic spots, hotels facilities and so forth. The main reason for this is lacking adaptive handling mechanism for this situation. This paper describes the mechanism of tourism information Change...
With the development of the university digitalized campus and widespread using of information systems, how to solve the sharing and interoperation of data between different departments and existing systems has become a new requirements of the development. Web Services has excellent characteristics like portability, loose coupling and Scalability, it can achieve the sharing and interoperation of data...
Web Services are at the heart of many Internet-based e-business systems. Security issues in web services are critical for the continuity of the provided services. Solutions such as Role-Based Access Control and Trust-Based Access Control were proposed to address threats to security in single Web Service scenarios. These solutions do not fully provide the required security level in situations related...
If we minutely analyze our day to day life then we shall find that it consists of utilization of some resources that are needed for our survival. Cloud computing plays a major role in this orientation by providing different resources in the form of web services like tax calculation web service, stock information web service, e-banking web service etc; for the smooth running of our daily lives. But...
Services participating in the composition are usually co-ordinated according to a workflow, composed by several activities, each of which carried out by a service. The binding of services to workflow activities may be affected by several parameters (e.g., QoS, price, reputation, etc.). In this paper, we propose a service binding driven by a further important requirement, that is, the incompatibilities...
Event-drive business processes require integration with distributed heterogeneous services to fulfill the functionalities. Business processes run in parallel and interact with multiple services, partners and customers as per the requirement and policy. There is a need to aggregate information from multiple resources or services according to policy. Resource or service aggregation provides better query,...
This paper presents a service that provides security through the technology of Web services. The use of web services to provide security in e-learning systems will complement the features of services developed in language and/or different architectures. Thus, our work is not limited to platforms in which the client (e-learning system) was developed, since this service is provided on a flexible, scalable...
Recently, Web services security has shown a significant gesture as several specifications have been developed and implemented to meet the security challenges of Web services. However, the performance of the security mechanisms is fraught with concerns due to additional security contents in SOAP messages, the higher number of message exchanges to establish trust as well as extra CPU time to process...
With the aim for promoting separation of crosscutting concerns, the notion of aspects are currently introduced throughout the lifecycle of software development, even to other domains. Many aspects are found, designed or implemented thereby. As the concrete specification and implementation mechanisms vary greatly among aspects, it is relatively complex and difficult to compare them. This paper provides...
Policy Enforcer is an online monitoring tool for detecting security violations in a multi domain environment where the network, system and service are the multiple domains. One can ensure security for a network service by protecting the sensitive resources at these three domains. This paper presents the various design issues of policy enforcer, which have the performance impact in terms of detection-rate,...
Exposing students to research topics enhances their learning experience. It is therefore desirable for instructors to include a research component into their courses. The courses most prone for incorporating research components are the upper level undergraduate and graduate courses. However, this becomes challenging in the case of introductory courses, where learning new programming skills is the...
The Securities Technologies (ST) Workshop for WETICE 2008 accepted two papers as full papers for this year's workshop. The committee received a total of eight papers for the ST workshop. The two papers did cover quite interesting topics and provided some good discussion.
Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified...
This paper proposed a two layer authorization mechanism, including traditional password system and rhythm recognition. The whole system includes two phases: preprocessing and usual operation for users. In preprocessing phase, users type password in a specific rhythm in order to record and analyse the characteristics of behaviour of users. In the second phase, how to verify a user in usual operation...
This paper presents a course model for teaching component-based software development (CBSD) in the software engineering undergraduate curriculum to deepen and broaden student comprehension of component software. All hands-on lab practices are designed with open-source software tools. The course endows students the precious experiences of making design decisions via comparative study, risk analysis,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.