The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This research developed the MySQL Sandbox, a secured environment for processing SQL queries. It was implemented as a RESTful web service having three services - sandbox database creation, SQL statement processing and sandbox database resetting. It supports the simultaneous processing of multiple SQL statements from multiple users in multiple databases. It uses question identification (ID) and student...
Today's modern information era society imposes great necessity of various software applications which now have an increasingly important impact on human life. The need for software applications and developers is rapidly increasing. To make up that demands enterprises have to make more applications in shorter time frames. Workload of software companies is constantly increasing, as they not only have...
This system is based on C/S architecture design and development of service-oriented architecture of financial information management system, users can end the system directly through the client-related operations, the user submits a request to the server, the server accesses the database, in order to ensure that the database security, according to the function of the system is divided module testing,...
Kuwait is aspiring to be amongst the top countries in the world in the provision of healthcare services to its people. To do this, issues surrounding information availability, data security, and data privacy must be addressed. Hospitals struggle with providing access to (possibly sensitive and critical) data at the right levels, at the right time, while ensuring seamless service. In this paper, we...
Peer review has long been used in education to provide students more timely feedback and allow them to learn from each other's work. In large courses and MOOCs, there is also interest in having students determine, or help determine, their classmates' grades. This requires a way to tell which peer reviewers' scores are credible. This can be done by comparing scores assigned by different reviewers with...
Business critical web applications are the most popular services provided to the client by the financial sector. These applications are bringing handsome revenue for the financial industry every year. These services are also a frequent target of attackers. Poor coding practice leads applications to vulnerability that are exploited by attackers. Information and privileges such as access to databases,...
Providing the capability of connecting and transferring information between geographically separated health centers is one of the major contributions of TC'F researchers in the health sector. The utilization of this advancement is hindered by the low penetration of Internet services in developing countries and especially in rural areas. Taking into consideration the recent advances and the wide spread...
The development of information systems in healthcare has grown considerably in recent years. With the evolution of systems based on distributed processing, using the Internet and cloud computing systems can develop much more effective and efficient, particularly in the health field. The proposed system involves the creation of databases, distributed or not, with integration of Web services that may...
The underlying technologies used by Web services bring known vulnerabilities to a new environment as well as increased targeting by attackers. The classical approaches--knowledge and signature based, respectively--for attack detection either produce high false positive detection rates or fails to detect attack variations, leading to 0-day attacks. To counter this trend, an ontology can help build...
Developers often rely on penetration testing tools to detect vulnerabilities in web services, although frequently without really knowing their effectiveness. In fact, the lack of information on the internal state of the tested services and the complexity and variability of the responses analyzed, limits the effectiveness of such technique, highlighting the importance of evaluating and improving existing...
The Central Database is one of the core components in the Palestinian e-Government technical framework. The Central Database model lacks features such as: interoperability, flexibility, and manageability. The purpose of this paper is to propose a SOA based solution for the Central Database that achieves the above features.
Secure mobile payment is the most important link for a mobile phone to realize full payment. At the present stage, there are many researches about security of mobile information in the country. Those researches are mainly based on Windows Mobile, BREW or software of J2ME, and limited to specific areas. On the aspect of the hardware cryptograph, they focus on the security of computer information. There...
Large-scale data processing systems frequently require users to make timely and high-value business decisions based upon information that is received from a variety of heterogeneous sources. Such heterogeneity is especially true of service-oriented systems, which are often dynamic in nature and composed of multiple interacting services. However, in order to establish user trust in such systems, there...
The Linked Data movement has been very successful in bringing large amounts of open RDF data on the Web. Much research and development work has been done on publishing Linked Data, while update access to linked data sources has been neglected. This paper presents a configurable approach to creating custom RESTful APIs for writing and updating linked data. In the spirit of hypertext, the approach fully...
This paper describes an approach for mediating the differences between the Geospatial domain and the Grid environment and creating an interoperable communication between these two platforms. The interoperability between the Geospatial Web services and the Grid infrastructure is part of the enviroGRIDS project and promises to solve important problems from the Earth Observation field, dealing with processing...
Research on the Web Service technology is carried out according to the practical system acquirement, the priority and advantage of the Web Service technology is explained. Based on the deep analysis of the architecture and the implementing theory of the Web Service technology, the network teaching platform based on multi-tier architecture is designed, in which Web Service is used to the design of...
E-commerce system design based on B / S structure gives us a lot of convenience, but it also brings security risks: the password is compromised or decoded. This paper presents a solution for rural e-commerce platform based on smart client security technology, it can not only increase the security of the system, but also has the characteristics of flexible operation. If a new type of rural e-commerce...
This paper proposes a methodology and a tool to evaluate the security risk presented when using software components or systems. The risk is estimated based on known vulnerabilities existing on the software components. An automated tool is used to extract and aggregate information on vulnerabilities reported by users and available on public databases (e.g., OSVDB and NVD). This tool generates comprehensive...
The current focus of enterprises on automating processes has led to the extensive application of workflow management systems. It has previously been difficult to integrate traditional workflow management systems with other types of systems, but the rapid development of Web services has solved communication problems between heterogeneous platforms and allowed for the efficient integration of legacy...
Business critical applications are increasingly being deployed as web services that access database systems, and must provide secure operations to its clients. Although the open web environment emphasizes the need for security, several studies show that web services are still being deployed with command injection vulnerabilities. This paper proposes a learning-based approach to secure web services...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.