[图书][B] Security for web services and service-oriented architectures
Web services technologies are advancing fast and being extensively deployed in many di?
erent application environments. Web services based on the eXt-sible Markup Language …
erent application environments. Web services based on the eXt-sible Markup Language …
Underwater image enhancement by attenuation inversionwith quaternions
F Petit, AS Capelle-Laizé… - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
In this paper, an underwater image enhancement method using quaternions is presented.
This work aims to improve color rendition and contrast of the objects, as if the scene has …
This work aims to improve color rendition and contrast of the objects, as if the scene has …
Lifecycle design and support of intelligent web-based service systems
JPT Mo, W Lorchirachoonkul - International Journal of Agile …, 2016 - inderscienceonline.com
The internet provides the opportunity for many web-based systems to be developed for
specific business and service purposes. However, the support for this type of system is …
specific business and service purposes. However, the support for this type of system is …
The SCIFC model for information flow control in web service composition
W She, IL Yen, B Thuraisingham… - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
Existing Web service access control models focus on individual Web services, and do not
consider service composition. In composite services, a major issue is information flow …
consider service composition. In composite services, a major issue is information flow …
Purpose-based privacy preserving access control for secure service provision and composition
M Amini, F Osanloo - IEEE Transactions on Services Computing, 2016 - ieeexplore.ieee.org
Two main security issues in software as a service (SaaS) delivery model of cloud
environments are access control and privacy preserving in basic web services as well as …
environments are access control and privacy preserving in basic web services as well as …
[PDF][PDF] Forensics investigation of web application security attacks
A Lazzez, T Slimani - International Journal of Computer Network and …, 2015 - academia.edu
Nowadays, web applications are popular targets for security attackers. Using specific
security mechanisms, we can prevent or detect a security attack on a web application, but …
security mechanisms, we can prevent or detect a security attack on a web application, but …
Rule-based run-time information flow control in service cloud
W She, IL Yen, B Thuraisingham… - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
Service cloud provides added value to customers by allowing them to compose services
from multiple providers. Most existing web service security models focus on the protection of …
from multiple providers. Most existing web service security models focus on the protection of …
Security-aware service composition with fine-grained information flow control
W She, IL Yen, B Thuraisingham… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Enforcing access control in composite services is essential in distributed multidomain
environment. Many advanced access control models have been developed to secure web …
environment. Many advanced access control models have been developed to secure web …
Security policy composition for composite web services
F Satoh, T Tokuda - IEEE Transactions on Services Computing, 2010 - ieeexplore.ieee.org
An application based on the Service-Oriented Architecture (SOA) consists of an assembly of
services, which is referred to as a composite service. A composite service can be …
services, which is referred to as a composite service. A composite service can be …
Policy-driven service composition with information flow control
W She, IL Yen, B Thuraisingham… - 2010 IEEE International …, 2010 - ieeexplore.ieee.org
Ensuring secure information flow is a critical task for service composition in multi-domain
systems. Research in security-aware service composition provides some preliminary …
systems. Research in security-aware service composition provides some preliminary …