Automated Check-Post on Cloud using BigData Analysis with Web Service Security
نویسندگان
چکیده
منابع مشابه
Cloud-Aware Web Service Security: Information Hiding in Cloud Computing
This study concerns the security challenges that the people face in the usage and implementation of cloud computing. Despite its growth in the past few decades, this platform has experienced different challenges. They all arise from the concern of data safety that the nature of sharing in the cloud presents. This paper looks to identify the benefits of using a cloud computing platform and the i...
متن کاملContent an Insight to Security Paradigm for BigData on Cloud: Current Trend and Research
Received Jan 7, 2017 Revised Jun 12, 2017 Accepted Sept 11, 2017 The sucesssive growth of collabrative applications producing Bigdata on timeline leads new opprutinity to setup commodities on cloud infrastructure. Mnay organizations will have demand of an efficient data storage mechanism and also the efficient data analysis. The Big Data (BD) also faces some of the security issues for the impor...
متن کاملWeb Service Composition: A Reality Check
Automated web service composition is one of the major promises of serviceoriented architecture, where services can be discovered and composed dynamically and automatically. To investigate the methods for composite web service construction, we conducted an experiment on creating useful composite web services from real existing web services where semantic annotations are not available. The empiri...
متن کاملAutomated Web Service Composition
Director I certify that this thesis satisfies all the requirements as a thesis for the degree of Master of Science. This is to certify that we have read this thesis and that in our opinion it is fully adequate, in scope and quality, as a thesis for the degree of Master of Science. I hereby declare that all information in this document has been obtained and presented in accordance with academic ...
متن کاملWeb Service Security
Authentication is the process of making sure that the person who is requesting a web service is really the person that they claim to be. This is done by requiring the user to provide a set of credentials. In return, they will receive a security token that can be used to access the server. The credentials usually take the form of a user id and password. On the other hand, the security token that...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2015
ISSN: 0975-8887
DOI: 10.5120/19810-1603