The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due the availability of new data transmission technologies and new standards for medical studies development, e-health systems have had a sustained adoption in recent years. In this scenario, the health systems are incorporating and increasing the health services offering in response to their needs. This paper presents a system able to transmit medical studies using different communication channels...
We describe a framework for capturing data provenance information to support Information assurance attributes like availability, authentication, confidentiality, integrity and non-repudiation. Our approach is applicable to multi-level secure systems where it is not always possible to directly provide data source and data transformation information. We achieve this by combining the subjective and objective...
Service-oriented architecture provides flexible methods for systems development and integration. It is widely adopted in Web services. On the basis of studying service-oriented architecture and Web service security standards, this paper proposes a method for accessing trusted services based on service-oriented architecture and gives out a system implementation model.
This paper analyzes three different granularity levels in the software patterns, which are architectural patterns, design patterns, idioms, etc. An effective method of software development based on the software patterns reuse is given. The information publication subsystem in basic education information platform is demonstrated as an example to introduce the applications of architectural patterns,...
Handling of confidential and sensitive data is an important issue facing any professional service provider that wishes to use services from a third party company. This paper describes an infrastructure, the privacy infrastructure appliance that was designed to protect confidential information when outsourcing service fulfillment. A comparison is made with an embedded solution that does not use an...
On the basis of analyzing the requirements to the security of collaborative commerce system based on service oriented architecture, a security solution which can solve the security problem is proposed. The solution includes some technologies such as XML encryption, authority access control, signatures and intrusion detection, etc.
WS-Security is an essential component of the Web services protocol stack. WS-Security provides end-to-end security properties (integrity, confidentiality, and authentication) through open XML standards. End-to-end message security assures the participation of non-secure transport intermediaries in message exchanges, which is a key advantage for Web-based systems and service-oriented architectures...
We developed a framework for reflective middleware that monitors security capabilities that every software component has. The main idea is to monitor the applications, changing or tuning the software components with the explicit goal of making the whole system as secure as possible. The middleware is flexible enough to be configured with the specific needs of the system that is going to be monitored...
Today Web services have grown in context of both business to business (B2B) and business to customer (B2C) applications. Web services are the most popular mode of implementing service oriented architecture (SOA). With this growth and acceptance in the industry, the role of security is crucial. Most of the existing security mechanisms in Web services like XML encryption, digital signatures, user tokens...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.