نتایج جستجو برای: web service security

تعداد نتایج: 669777  

Journal: :ACM transactions on privacy and security 2022

Migrating enterprises and business capabilities to cloud platforms like Amazon Web Services (AWS) has become increasingly common. However, securing operations, especially at large scales, can quickly intractable. Customer-side issues such as service misconfigurations, data breaches, insecure changes are prevalent. Furthermore, cloud-specific tactics techniques paired with application vulnerabil...

Journal: :Int. J. Adv. Comp. Techn. 2010
M. S. Saleem Basha

In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assaults. Business partners want to know that the business did enough to protect the information goods. The Web Service is the perfect blue print for the agile business environment due to loose in nature, flexibility re-usa...

2016
Peter T. Nkomo Marijke Coetzee

Service-oriented architecture defines a paradigm for building applications by assembling autonomous components such as web services to create web service compositions. Web services are executed in complex contexts where unforeseen events may compromise the security of the web services composition. If such compositions perform critical functions, prompt action may be required as new security thr...

2011
Mehdi Sabbari Hadiseh Seyyed Alipour

Service Oriented Architecture (SOA) establishes an architectural model that aims to enhance the efficiency, agility, and productivity of an enterprise by positioning services as the primary means through which solution logic is represented in support of the realization of strategic goals associated with service-oriented computing. Web services seem to become the preferred implementation technol...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان - دانشکده برق و کامپیوتر 1392

موضوع پایان نامه ی من در رابطه با الگوریتمی در زمینه ی وب سرویس ها است که برای کشف آسان وب سرویس های مورد نیاز کاربر ارائه شده است

2003
Shaomin Zhang Baoyi Wang Lihua Zhou

The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architectures such as PKI. A new Web service layer security model is proposed, and its characteristics are described. Finally, the paper focuses on the implementation of the security services sub-layer XKMS, and describes its des...

2010
V. Prasath

Current trends in performing business-to-business transactions and enterprise application integration have been extended to the use of web service. With web services being accepted and deployed in both research and industrial areas, the security related issues become important. Web services security has attracted the attention of researchers in the area of security due to the proven fact that m...

2016
Bin Xu Tao Li Zhifeng Gu Gang Wu Jeffrey R. Williams George F. Jelen Aabhas V. Paliwal Nabil R. Adam Hui Xiong Christof Bornhövd Colin Atkinson Philipp Bostan Oliver Hummel

Current trends in performing business-to-business transactions and enterprise application integration have been extended to the use of web service. With web services being accepted and deployed in both research and industrial areas, the security related issues become important. Web services security has attracted the attention of researchers in the area of security due to the proven fact that m...

2004
Daniel Baer Andreas Philipp Norbert Pohlmann

Funktionsweise, nennt Vor-und Nachteile und gibt Einblick in die Realisierung eines XKMS Re-sponders im Rahmen des Projektes TrustPoint.

Journal: :IJWIS 2010
Sayed Gholam Hassan Tabatabaei Amir Vahid Dastjerdi Wan M. N. Wan-Kadir Suhaimi Ibrahim Elahe Sarafian

Purpose – Automated composition of semantic web services has become one of the recent critical issues in today’s web environment. Despite the importance of artificial intelligence (AI)-planning techniques for web service composition, previous works in that area do not address security issues, which is the focus of this paper. The purpose of this paper is to propose an approach to achieve securi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید