نتایج جستجو برای: web security
تعداد نتایج: 387707 فیلتر نتایج به سال:
this paper first describes ways of semantic web security implementation through layers. These layers are presented as a backbone for semantic web architecture and are represented in XML security, RDF security and in an idea of semantic web security standardization.
—This paper discusses the security implications of Web Services and proposes a framework for providing security based on current and future requirements. The framework provides a basis for achieving end-to-end security for Web Services within the pre-existing security environment. Finally, lessons from initial experiences with Web Services security and advice for the future are provided. Web Se...
The Internet has provided an avenue for businesses to adopt web services. Web services promises scalability, agility, cost reduction, profitability and availability thereby meeting instant gratification needs of web users’. It refers to modular Internet-based business functions that perform specific business tasks to facilitate business interactions within and beyond the organization. While add...
The integration of security and forensics into Web Engineering curricula is imperative! Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually. Security is frequently taught as a stand-alone course, assuming that security can be 'bolted on' to a web application at some point. Security issues must be integrated into Web E...
Securing Web-based resources is one of the biggest challenges for IT today. Almost all IT organizations use security measures through authentication and authorization to protect their Web resources. Thus, it is vital for SAS Business Intelligence Web applications to integrate within a secure Web environment. This paper explores just that. SAS Business Intelligence Web applications are implement...
The Service Oriented Architecture (SOA) becomes an essential element of modern Enterprise Application Integration (EAI). Among the available SOA implementations, Web Services are most preferable choice by the enterprises as they operate on simple Internet protocols. In principle, web services use SOAP protocol as a base for transmitting requests and responses in between service requester and se...
In today’s business environment, the use of web services technology is becoming more popular. This growth has been met with an increase of security related attacks, which has caused web services providers to adopt stricter security policies. As not all web service consumers can implement the security requirements of web services providers, they may turn to use the services of other providers. I...
This paper analyzes the most common security problems of web application level. A model WALSG (Web Application Level Security Gateway) is presented to provide web application level security. WALSG employs XML Schema to specify access control policies and security policies for HTML pages and cookies. WALSG can also be used as a secure tool to define access control policies and security policies ...
Web database is combination of database and web technology. Web database is placed on the Internet, there are many security problems. Web and distributed databases play the key role in most of these Web applications and thus it is critical to protect them from unauthorized access and malicious attacks. The secrecy and the integrity are two important demands of security system. When database acc...
Web Services has emerged as a dominant paradigm for constructing and composing distributed business collaborations over the web. Security is one of the major concerns when developing mission critical business applications and this concern motivates Web Services Security specifications. This paper provides the literature review on the construction of solutions to SOA attacks on SOAP based web se...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید