Results 301 to 310 of about 2,319,668 (347)
Some of the next articles are maybe not open access.
On the Synthesis of Secure Services Composition
2014Web service composition is one of the main research challenges of the last decades. Several frameworks have been developed to compose services in order to meet requirements and constraints imposed by a service consumer. Hereafter, we survey research work on evaluation and automatic synthesis of service composition with a particular eye to security ...
Jose A Martìn +4 more
openaire +5 more sources
Proceedings 21st International Conference on Distributed Computing Systems Workshops, 2002
Active spaces and smart rooms are quickly gaining popularity in both the research arena, and in commercial projects. Active spaces are physical spaces populated with massive numbers of specialized embedded computing devices that increase human productivity by enabling users to interact seamlessly with the surrounding environment.
Roy H. Campbell +2 more
openaire +2 more sources
Active spaces and smart rooms are quickly gaining popularity in both the research arena, and in commercial projects. Active spaces are physical spaces populated with massive numbers of specialized embedded computing devices that increase human productivity by enabling users to interact seamlessly with the surrounding environment.
Roy H. Campbell +2 more
openaire +2 more sources
2006 International Conference on Dependability of Computer Systems, 2006
Security issues within Web services, and problems of data confidentiality and integrity in particular, are discussed. A joint security model integrating three main technologies (SOAP, UDDI and WSDL) is defined. Suitable security mechanisms and solutions are also described.
Henryk Krawczyk, M. Wielgus
openaire +2 more sources
Security issues within Web services, and problems of data confidentiality and integrity in particular, are discussed. A joint security model integrating three main technologies (SOAP, UDDI and WSDL) is defined. Suitable security mechanisms and solutions are also described.
Henryk Krawczyk, M. Wielgus
openaire +2 more sources
1995
The bureaucracy helps to make and implement laws; the police uphold and enforce them. Every country maintains security services to protect its citizens from lawlessness within and enemies without. Because of their coercive nature, however, the security services can also be misused by governments as an instrument for oppressing their own people. In this
openaire +2 more sources
The bureaucracy helps to make and implement laws; the police uphold and enforce them. Every country maintains security services to protect its citizens from lawlessness within and enemies without. Because of their coercive nature, however, the security services can also be misused by governments as an instrument for oppressing their own people. In this
openaire +2 more sources
2006
During the past few years, significant standardization work in the Web services (WS) technology area has been performed. As a consequence of these initial efforts, WS foundational stable specifications have already been delivered. Now, it is time for the industry to standardize and address the security issues that have emerged from this paradigm.
Carlos A.G. Garcia +2 more
openaire +2 more sources
During the past few years, significant standardization work in the Web services (WS) technology area has been performed. As a consequence of these initial efforts, WS foundational stable specifications have already been delivered. Now, it is time for the industry to standardize and address the security issues that have emerged from this paradigm.
Carlos A.G. Garcia +2 more
openaire +2 more sources
2014 IEEE International Conference on Services Computing, 2014
Developing contemporary software architectures requires the consideration and adoption of the Service-oriented Architecture (SOA) principles. Distributed applications are a very common domain in which SOA guides design decisions in particular. For a long time, SOAP and its related stack of standards have been the only technological choice for ...
Peter Leo Gorski +3 more
openaire +2 more sources
Developing contemporary software architectures requires the consideration and adoption of the Service-oriented Architecture (SOA) principles. Distributed applications are a very common domain in which SOA guides design decisions in particular. For a long time, SOAP and its related stack of standards have been the only technological choice for ...
Peter Leo Gorski +3 more
openaire +2 more sources
IBM Systems Journal, 2002
The Web service security challenge is to understand and assess the risk involved in securing a Web-based service today, based on our existing security technology, and at the same time track emerging standards and understand how they will be used to offset the risk in new Web services.
Nataraj Nagaratnam +2 more
openaire +2 more sources
The Web service security challenge is to understand and assess the risk involved in securing a Web-based service today, based on our existing security technology, and at the same time track emerging standards and understand how they will be used to offset the risk in new Web services.
Nataraj Nagaratnam +2 more
openaire +2 more sources
Proceedings of the 5th International Conference on PErvasive Technologies Related to Assistive Environments, 2012
Traditional secure channels use a secure session key to encrypt communication messages within a time limit. For website cases, browsers can not initiate a request for a secure session, and sometimes it is not necessary to encrypt the entire session. Our On-Demand Security Service (ODSS) addresses these problems by designing an "in session" protocol on ...
Jiafeng Zhu +4 more
openaire +2 more sources
Traditional secure channels use a secure session key to encrypt communication messages within a time limit. For website cases, browsers can not initiate a request for a secure session, and sometimes it is not necessary to encrypt the entire session. Our On-Demand Security Service (ODSS) addresses these problems by designing an "in session" protocol on ...
Jiafeng Zhu +4 more
openaire +2 more sources
2005
Web services are becoming important integrative component of modern, distributed information systems. However, data transfer over the public infrastructure imposes strong security demands which should be met by the developers of such systems. There are various ways to solve security issues, and they should be validated within the context of particular ...
Vrček, Neven +2 more
openaire +2 more sources
Web services are becoming important integrative component of modern, distributed information systems. However, data transfer over the public infrastructure imposes strong security demands which should be met by the developers of such systems. There are various ways to solve security issues, and they should be validated within the context of particular ...
Vrček, Neven +2 more
openaire +2 more sources
Information Systems Security, 2001
Abstract As I predicted earlier this year, this has been a difficult time for all the start-ups in the information security business. With the economy struggling along, there have been many layoffs and hiring freezes within our industry. I was recently talking to a recruiter who had called me.
openaire +2 more sources
Abstract As I predicted earlier this year, this has been a difficult time for all the start-ups in the information security business. With the economy struggling along, there have been many layoffs and hiring freezes within our industry. I was recently talking to a recruiter who had called me.
openaire +2 more sources

