Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The adoption of ID security authorization is the inevitable trend for the development of Web service security technology according to the requirement of diversification, integration and convenience for Web service. In this paper, a URL-based Web service unified ID authorization model is proposed based on the existent Web service security regulation firstly. Then the key technologies related with the...
In this paper, we present an end-user tool called the privacy protection framework (P2F) which aims to support users in protecting their privacy when obtaining Web-based services. P2F acts as a recommendation tool that analyzes the user's transaction history and privacy preferences in addition to real-world privacy guidelines to prevent undesirable disclosure of personal data. The framework is based...
The main goal of this article is to show a new approach to software development and integration. Article shows how Service Oriented Architecture can change the way of business and IT cooperation. Based on BPEL language Document Management System illustrates how easily business people can change business logic of application without any special technical knowledge.
Information communication technology (ICT) has penetrated the government sector due to their increased functionality, low cost, high reliability and easy-to-use nature. However, in such E-government applications the privacy and security of the transmitted information must be preserved. Also different civil servant involved in the government must have different access privileges to the government information...
One of the most significant difficulties with developing service-oriented architecture (SOA) concerns its security challenges. In particular, the authorization task is especially demanding because of the diverse access requirements within the various SOA environments, such as the business world, the academic setting and the industry atmosphere. In this paper, we propose a 4-attribute vector authorization...
When database resources being integrated into the pervasive environment, the universal key problem to solve is access mechanisms of database security. The database security mechanisms have already been firmed in the database system. When more flexible security schemas to adapt to the pervasive environment are needed, the database system could solve the problem above insufficiently by itself. We could...
In traditional grid, grid user can not validate whether grid service registered in grid platform can execute correctly or not because the system does not provide the measurement mechanism for grid service. In order to solve this problem, we propose a series of strategies and methods for trusted grid. These strategies and methods include: an access control policy for reference database, an integrity...
The purpose of this study is to customize the current Document Management System (DMS) known as Unstructured Data Repository (UDR) by consuming the web services technology. UDR is an electronic repository containing digitized Exploration & Production (E & P) drilling reports. The customization is done within the web using .NET platform. The target users are working people in the (E & P)...
With the increasing popularity of Web services, attackers are getting attracted to hack the Web services and the servers on which they run. One of the major threats is that of intruders which may maliciously try to access the data or services. Thus there is a need to protect the servers on which Web services are running from intruders. Therefore, intrusion detection systems need to be employed. Signature...
The dynamic nature of the Internet poses various challenges to the successful execution of composite Web services. Failures are samples of these challenges. It needs to be addressed for the smooth progress of Web service composition. Unfortunately, the de facto standard for modeling composition namely BPEL is not equipped with mechanisms that let Web services "heal" themselves in case of...
The research project aims at designing and implementing a Web based wireless mobile system security and privacy framework that is centered on the concepts of ubiquitous healthcare services provided to the patients in rural or remote areas from distant hospitals. With this system framework, a physician can securely access and carry the patient information from a mobile device, update the patient information...
Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified...
This paper proposed a two layer authorization mechanism, including traditional password system and rhythm recognition. The whole system includes two phases: preprocessing and usual operation for users. In preprocessing phase, users type password in a specific rhythm in order to record and analyse the characteristics of behaviour of users. In the second phase, how to verify a user in usual operation...
Despite the fact that geospatial data is available in existing aviation databases, it is a key factor not being used in retrieving information, causing inability to make time-critical decisions. Searching NOTAM data based on a geographic area is a missing component in today's widely used NOTAM Web services. Geospatially enabled NOTAM Web service was implemented providing a solution for location-based...
Web services-based technologies have emerged as a technological alternative for computational web portals. Facilitating access to distributed resources through web interfaces while simultaneously ensuring security is one of the main goals in most of the currently existing manifold tools and frameworks. OpenCF, the open source computational framework that we have developed, shares these objectives...
Web applications are widely adopted and their correct functioning is mission critical for many businesses. At the same time, Web applications tend to be error prone and implementation vulnerabilities are readily and commonly exploited by attackers. The design of countermeasures that detect or prevent such vulnerabilities or protect against their exploitation is an important research challenge for...
Data sharing is increasingly important in modern society, yet researchers typically focus on a single technology, such as Web services, or explore only one aspect, such as semantic integration. The authors propose a technology-neutral framework for characterizing data sharing problems and solutions and discuss open research challenges.
The UNICORE grid system provides a seamless, secure and intuitive access to distributed grid resources. In recent years, UNICORE 5 is used as a well-tested grid middleware system in production grids (e.g. DEISA, D-Grid) and at many supercomputer centers world-wide. Beyond this production usage, UNICORE serves as a solid basis in many European and International research projects and business scenarios...
Accelerated by the rapid deployment of distributed systems and the Internet, online collaboration and information sharing are pervasive in enterprise computing environment. With regard to the requirements of online collaboration and information sharing, authentication information needs flexible manipulation to facilitate federation across trust domains. To achieve identity federation for federated...
We developed a quality of service (QoS) management system to support service level management (SLM) for global enterprise services. The QoS management system is integrated with one of our enterprise services in a preproduction system, an identical system as the production system but in a test environment. Lab experiments showed that our integrated solution helps global enterprise services to better...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.