نتایج جستجو برای: web service security
تعداد نتایج: 669777 فیلتر نتایج به سال:
Migrating enterprises and business capabilities to cloud platforms like Amazon Web Services (AWS) has become increasingly common. However, securing operations, especially at large scales, can quickly intractable. Customer-side issues such as service misconfigurations, data breaches, insecure changes are prevalent. Furthermore, cloud-specific tactics techniques paired with application vulnerabil...
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assaults. Business partners want to know that the business did enough to protect the information goods. The Web Service is the perfect blue print for the agile business environment due to loose in nature, flexibility re-usa...
Service-oriented architecture defines a paradigm for building applications by assembling autonomous components such as web services to create web service compositions. Web services are executed in complex contexts where unforeseen events may compromise the security of the web services composition. If such compositions perform critical functions, prompt action may be required as new security thr...
Service Oriented Architecture (SOA) establishes an architectural model that aims to enhance the efficiency, agility, and productivity of an enterprise by positioning services as the primary means through which solution logic is represented in support of the realization of strategic goals associated with service-oriented computing. Web services seem to become the preferred implementation technol...
موضوع پایان نامه ی من در رابطه با الگوریتمی در زمینه ی وب سرویس ها است که برای کشف آسان وب سرویس های مورد نیاز کاربر ارائه شده است
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architectures such as PKI. A new Web service layer security model is proposed, and its characteristics are described. Finally, the paper focuses on the implementation of the security services sub-layer XKMS, and describes its des...
Current trends in performing business-to-business transactions and enterprise application integration have been extended to the use of web service. With web services being accepted and deployed in both research and industrial areas, the security related issues become important. Web services security has attracted the attention of researchers in the area of security due to the proven fact that m...
Current trends in performing business-to-business transactions and enterprise application integration have been extended to the use of web service. With web services being accepted and deployed in both research and industrial areas, the security related issues become important. Web services security has attracted the attention of researchers in the area of security due to the proven fact that m...
Funktionsweise, nennt Vor-und Nachteile und gibt Einblick in die Realisierung eines XKMS Re-sponders im Rahmen des Projektes TrustPoint.
Purpose – Automated composition of semantic web services has become one of the recent critical issues in today’s web environment. Despite the importance of artificial intelligence (AI)-planning techniques for web service composition, previous works in that area do not address security issues, which is the focus of this paper. The purpose of this paper is to propose an approach to achieve securi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید