The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
ASIP is very suitable for the processing core of embedded systems, and the software technology of MDA, UML/XML provides security for its tools, the coupling between them will be the next technology feature. Moreover the design schema for ASIP MDA based UML/XML has been put forwarding in the paper.
The development of web 2.0 increases the call for agile and simple Business process support. SOA (Service oriented Architecture) provides companies with a new model to build their IT applications around their business processes and combine them dynamically and flexibly with the services of partner companies. In this open and distributed context, it is required to implement an appropriate security...
As newer software construction paradigms like service-oriented architecture (SOA) are adopted into systems of critical importance, it becomes imperative that technology and design artifacts exist that can be utilized to raise the resiliency and protection of such systems to a level where they can withstand sustained attacks from well-motivated adversaries. In this paper we describe a sampling of innovative...
Internet-based E-government has become a new work model of government departments. But due to heterogeneous and autonomous between different business systems, there are barriers in E-government systems when they are interoperating. To eliminate information silos, building a unified information-sharing platform is a necessary choice for the work of the government's information. This paper studies service-oriented...
A large number of enterprises are turning to service-oriented architecture (SOA) for designing, using and managing their information technology (IT) systems. SOAP-based web services are the most commonly found services in today's SOA implementations. This paper reviews different possible classes of vulnerabilities in web services and investigates the advantages and shortcomings of available solutions...
We describe a framework for capturing data provenance information to support Information assurance attributes like availability, authentication, confidentiality, integrity and non-repudiation. Our approach is applicable to multi-level secure systems where it is not always possible to directly provide data source and data transformation information. We achieve this by combining the subjective and objective...
Service-oriented architecture provides flexible methods for systems development and integration. It is widely adopted in Web services. On the basis of studying service-oriented architecture and Web service security standards, this paper proposes a method for accessing trusted services based on service-oriented architecture and gives out a system implementation model.
Due to the dynamic nature, such as runtime composition and evaluation, it is critical for an SOA system to integrate its data, which concerns security, reliability, and integrity of data as it is routed in the system. To solve the data integration problem in current business systems, a dynamic data integration model based on SOA is proposed. This model which is dynamic and application oriented extends...
Handling of confidential and sensitive data is an important issue facing any professional service provider that wishes to use services from a third party company. This paper describes an infrastructure, the privacy infrastructure appliance that was designed to protect confidential information when outsourcing service fulfillment. A comparison is made with an embedded solution that does not use an...
Access to Web services via Web front-ends provides all the advantages related to browser-based thin clients and is therefore a common setting. However, providing end-to-end security between Web browsers and Web services is currently not feasible due to the inadequate support for Web service security in Web browsers. Moreover, the current SOAP APIs offered by the major browsers are incompatible with...
On the basis of analyzing the requirements to the security of collaborative commerce system based on service oriented architecture, a security solution which can solve the security problem is proposed. The solution includes some technologies such as XML encryption, authority access control, signatures and intrusion detection, etc.
The following topics are dealt with: software agent; grid computing; data security; software architecture; multimedia system; mobile sensor wireless networks; peer-to-peer computing; data mining; e-business systems; XML technologies; network protocol; embedded system; RFID; text information retrieval; Web content analysis; and network traffic.
Internet is a place nowadays where interoperating services are offered which can be integrated or mashed up in order to fulfill user demands. This paper proposes a way to offer videoconference as a Web service over an interface which can be used by third parties to enrich their applications. This interface includes a security mechanism supporting delegated authorization to allow integration into third...
Many companies and governmental organizations are looking towards Web services, play an important key role in implementing service oriented architecture (SOA) as a platform that support a wide range of demanding applications. But current Web services standards have many critical limitations: performance degradation due to network latency and limited network bandwidth, vulnerability from security attacks,...
This paper focuses on agent-based enterprise information technology infrastructure support for privacy in the Web services architecture (WSA) in order to enforce privacy policies on private information (PI) used by applications. We provision the Web services platform (WSP) with mechanisms to not only enforce privacy policies on PI used by a Web service, but also gather intelligence about PI that is...
With the development of logistic system and the depth of the research of SOA, the requirements to the security of logistic system based on SOA are growing. On the basis of analyzing these requirements, a security solution which can solve the security problem is proposed. So the solution can provide the logistic system with the information security, authority access control, digital signature and intrusion...
Privacy in Web services is of great importance and a critical requirement for any business and non-business environments. The growth of Web services has been accompanied by sharing more and more user personal information with Web service providers between diverse and heterogeneous computing systems, which has raised concern about possible malicious or accidental unauthorized abuse of user information...
WS-Security is an essential component of the Web services protocol stack. WS-Security provides end-to-end security properties (integrity, confidentiality, and authentication) through open XML standards. End-to-end message security assures the participation of non-secure transport intermediaries in message exchanges, which is a key advantage for Web-based systems and service-oriented architectures...
We developed a framework for reflective middleware that monitors security capabilities that every software component has. The main idea is to monitor the applications, changing or tuning the software components with the explicit goal of making the whole system as secure as possible. The middleware is flexible enough to be configured with the specific needs of the system that is going to be monitored...
This paper suggests a service-oriented architecture (SOA)-based information assurance (IA) system engineering for system vulnerability in e-government. Once an information assurance vulnerability notice is given for a system, it is important for reducing massive system engineering efforts for IA vulnerability management. When systems are updated by security patch for mitigating system vulnerability,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.