Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Web applications are one of the most useful platforms for the delivery of the information and service over the internet today. Day-to-Day the popularity of web application usage is increasing. Hence the web apps has to be designed for secure transformation of information from web client to web server and to mitigate the vulnerabilities. This paper presents a research survey report on constructing...
Service Level Management (SLM) plays a central role to ensure the quality of service (QoS) in Public Cloud environments and requires a structured E2E approach to support the migration of critical services and sensitive data. In fact, the shift of responsibility to the Cloud Service Providers (CSPs) enables the customers (CSCs) to be more focused on the business, but, at the same time, they lose direct...
Transparent computing is an implementation of ubiquitous computing that is aimed at providing active services for users. In transparent computing, the execution (computation) of computer instructions and data is temporally and spatially separated from their storage. Cloud computing solves the issue of data cloudlization, while transparent computing solves the one of software cloudlization. This paper...
Continuous Integration (CI) is very useful for applications that involve many files and multiple developers. Unfortunately, not all types of applications can easily apply this approach. Apparently, CI does not gain a lot of attention with Modern Client-Side Web Application (MCSWA) because it requires complicated testing, i.e. the running environments are browsers. There is no compiler or error warning...
Information distribution regarding immediately correlated contents is a big challenge in local communities, such as a university campus. One of the main reasons is that a campus' local network is uncovered by public search engines, and most of the local Web sites in a community operate like information silos. A secondary reason is that the daily activities in a local community are highly dynamic,...
New web development technologies enhance functionality of web applications but also introduce challenges in testing the software. As mutation analysis has been shown to be effective at designing tests for traditional software, we previously proposed web mutation testing. However, applying mutation analysis can be computationally expensive due to an extensive number of test requirements. This paper...
Due to the rapid increase of the Internet traffic encryption HTTPS, and the newly adopted protocols HTTP2 and SPDY, the need for a comprehensive high-level information extraction tool that supports the new protocols becomes essential for critical applications such as digital and network forensic and web penetration testing. In spite of the availability of big data from the Internet traffic, current...
ere are numerous working projects on IoT platforms, and many projects employ JavaScript as their client-side language. One of the benets using JavaScript in IoT platforms is its great portability, which lets an application to run on any IoT devices that employ a JavaScript runtime. In this situation, user experiences can be enhanced if the states in the IoT devices can be shared so that a user can...
We propose a new approach to running machine learning (ML) web app on resource-constrained embedded devices by offloading ML computations to servers. We can dynamically offload computations depending on the problem size and network status. The execution state is saved in the form of another web app called snapshot which simplifies the state migration. Some issues related to ML such as how to handle...
Video on Demand (VoD) streaming constitutes a continuously increasing proportion of the global IP traffic. Conventional streaming approaches use a client-server topology, where one server or a group of servers serve all the clients. The main drawbacks of this technology is poor scalability. An alternative is the well known Peer-to-Peer (P2P) network topology which addresses this problem. However,...
Many innovations in the field of cryptography have been made in recent decades, ensuring the confidentiality of the message's content. However, sometimes it's not enough to secure the message, and communicating parties need to hide the fact of the presence of any communication. This problem is solved by covert channels. A huge number of ideas and implementations of different types of covert channels...
The Web has become an indispensable part of our society and is currently most commonly used mode of information delivery. Millions of users access the free services provided by the websites on daily basis and while providing these free services websites track and profile their web users. In this environment, the ability to track users and their online habits can be very lucrative for advertising companies,...
The research and commerce communities have a need to understand and use the Single-Page Application (SPA) framework written in JavaScript for knowledge discovery and global sharing of information. It is important to develop user-friendly web-based tools which efficiently process, analyze, and visualize scientific data. The efficient use of languages and tools such as HTML5, CSS3, and JavaScript Libraries...
Cross-site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form of JavaScript) to another user. XSS is one of the top 10 vulnerabilities on Web application. While a traditional cross-site scripting vulnerability exploits server-side codes, DOM-based XSS is a type of vulnerability which affects the script code being executed in the...
In an increasingly networked society users are spending more and more time on online activities every day. This is enforced by the continuous migration of applications from local environments to web-based offerings. As a consequence the daily life of people and industries are already depending on the availability of online resources. Still end-user devices are not providing detailed insight in networked...
As centralized social networking services (SNSs) or online social networks (OSNs) have inherent privacy concerns, researchers are working on decentralized SNSs as alternatives for addressing these problems. However, it is very difficult to decentralize all the functions of centralized SNSs. This paper describes a decentralized SNS using social virtual private networks (VPNs) that work together with...
We present a method of generation of one-time keys (OTK) for single line authentication using zero knowledge (ZK) computation as undertaken by an authentication client application on a mobile device and a registration server. The method comprises initiation of an activation process on the authentication client by a user associated with the mobile device, a ZK computation sequence on the authentication...
Cross site scripting (XSS) is a kind of common attack nowadays. The attack patterns with the new technical like HTML5 that makes detection task getting harder and harder. In this paper, we focus on the browser detection mechanism integrated with HTML5 and CORS properties to detect XSS attacks with the rule based filter by using browser extensions. Further, we also present a model of composition pattern...
The focus of this research work is to investigate the problem of providing partition tolerance in cloud-based applications while maintaining application data integrity. This study looks at developing a cloud application to track sales of admission tickets to a battlefield as a motivating example. Web browsers are run inside the premises of the enterprise selling the tickets, while the rest of the...
Modern webpages consist of many rich objects dynamically produced by servers and client terminals at diverse locations, so we face an increase in web response time. To reduce the time, edge computing, in which dynamic objects are generated and delivered from edge nodes, is effective. For ISPs and CDN providers, it is desirable to estimate the effect of reducing the web response time when introducing...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.