The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One of the key technologies on the Internet is the DNS protocol. While many studies have taken a statistical approach, the representation of DNS traces as a graph has not received enough attention. In this position paper we present our work of applying Process Mining (PM) techniques to study DNS traffic. Process Mining has been successfully used to understand processes on the enterprise as part of...
In this article we present our first approach in using Passive Testing (used in protocol and software conformance checking) and Process Mining (used in enterprise workflow analysis) techniques for analyzing DNS operation traces.
Companies increasingly rely on Internet for effective and efficient business communication. As Information Technology (IT) provides the infrastructure backbone for business activities, a corporate network connects the company to Internet and enables it to perform its activities globally. The corporate carries data packets generated by the users' while performing their business tasks. Traditionally,...
To face continuously growing security threats and requirements, sound methodologies for constructing secure systems are required. In this context, Model-Driven Security (MDS) has emerged since more than a decade ago as a specialized Model-Driven Engineering approach for supporting the development of secure systems. MDS aims at improving the productivity of the development process and quality of the...
Contemporary workflow management systems are determined by precise process models, i.e., a totally specific workflow design is necessary so as to discover a given workflow process. Creating a workflow design is a complex time-consuming process and characteristically there are conflicts and discrepancies between the real-time workflow processes and the processes as professed by the management. Consequently,...
There are numerous methods for identifying network traffic in recent research. In our experiment, flow is collected by using parallel probe and network IP packets are captured based on WinPcap's packet collecting technology. According to the characteristics of application layer protocol, a scalable identification system is proposed and network traffic can be classified as different application classes...
Business process management, service-oriented architectures and software back-engineering heavily rely on the fundamental processes of mining of processes and web service business protocols from log files. Model extraction and mining aim at the (re)discovery of the behavior of a running model implementation using solely its interaction and activity traces, and no a priori information on the target...
Current approaches to transactional support of distributed processes in service-oriented environments are limited to scenarios where the participant initiating the process maintains a controlling position throughout the lifetime of the process. This constraint impedes support of complex processes where participants may only possess limited local views on the overall process. Furthermore, there is...
Two parties that conduct a business transaction through the internet do not see each other face-to-face nor do they exchange any document or currency hand-to-hand. Electronic payment is a way by which the two parties transfer the money through internet. Offering electronic payment can also help businesses improve and customer retention. When electronic money is transferred from a buyer to a seller...
Grid technology has implemented effectively large scale resource share and high performance task collaboration, while grid workflow enables automated integration and automated execution based on grid services. However, currently transaction research on grid workflow is still not mature, and there are limitations when traditional transaction management approaches from transactional workflow are applied...
SaaS (software as a service), the new software application pattern has got wide attraction in both industry and academia. But transaction processing is a problem that prevents SaaS from wide spreading. To solve the problem, this paper proposes A business level compensation mechanism for multitenancy SaaS application transaction processing. The mechanism supports flexible and customizable transaction...
As is known to all, the shortcomings of traditional SOAP-based Web service and the older XML-RPC protocols, such as lacking of addressability and connectedness, greatly limit the modeling and abstraction of enterprise resources. In order to integrate the resources of enterprise information systems in heterogeneous environment, this paper proposes a REST-based resource-oriented approach to integrate...
In the advanced Internet age, researchers dream for a solution to truly enable cash to be available on the Internet with all facilities that we have it in normal usage. Last few years have seen many protocols and suggestion; but all have failed to provide anonymity and security together. This paper illustrates a new protocol for anonymous and secure e-commerce system for e-cash transaction. This paper...
In recent years, China P2P streaming industry, represented by PPlive and PPstream, has been having rapid progress, with the consumer scaled up and enhancement of the financial gain. The development brought the enormous consumption of network bandwidth. P2P streaming traffic identification provides the reliable basis on solving the overspend problem of the network bandwidth. This paper firstly introduces...
Implementing a workflow using previously implemented services is a typical task while dealing with Service-oriented Architectures (SOA). Defining these workflows is the task of business (process) analysts in tight collaboration with clients or domain experts. Unfortunately these analysts only have a sketchy view on the Service-oriented Architecture, thus they do not know which investigations a specific...
In 2005, an extensive taxonomy of threats for VoIP was published by a prominent industry group. Strangely, this taxonomy does not identify stegocommunication as a threat, even though many steganographic channels have been identified in VoIP protocols. To avoid such security gaps in the future, we argue that stegocommunication should be added to the traditional list of network threats: interruption,...
If environments offering facilities for service composition are to be commercially successful then it will be important that service providers can avail of efficient, automated processes by which composed services can be metered, charged and billed for. In many industries, for example telecommunications, sophisticated systems are employed to provide usage and content based charging for services. In...
The reconfiguration router unit (RRU) is one of the most effective solutions to improve router function extend. It can satisfy the urgent need of multi-network and multi-business. Component composition and compositional reasoning are the core technologies and frontier research areas in RRU. In the process of component composition, resource-control of router is the most important factor. How to detect...
As software-as-a-service (SaaS) becomes more and more popular, the identity management and federation among SaaS applications also become an important factor impacting the growth of SaaS ecosystem. Typically, there are three major functions to be enabled in identity federation: 1) single sign-on across different services. 2) Account provisioning to different services. 3) secure backend service call...
In this paper, a formal service behavior model called service-net based on colored Petri net (CP-Net) has been presented. Service-Net can be used to describe not only the control dependency and data dependency among inner operations of Web services, but also the message interactions of services with outer environments as an independent communication system. The correctness of interaction protocol...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.