Filters








206,988 Hits in 10.3 sec

Modeling Web Applications by the Multiple Levels of Integrity Policy

G. Amato, M. Coppola, S. Gnesi, F. Scozzari, L. Semini
2006 Electronical Notes in Theoretical Computer Science  
Modeling exploits the recent "Multiple Levels of Integrity" mechanism which allows objects with dynamically changing reliability to cooperate within the application.  ...  We propose a formal method to validate the reliability of a web application, by modeling interactions among its constituent objects.  ...  The Multiple Levels of Integrity policy permits some objects to receive low level data, by decreasing their integrity level.  ... 
doi:10.1016/j.entcs.2005.12.053 fatcat:52o67ezcrverdh7kn3vz2gh3by

Composing and Deploying Grid Middleware Web Services Using Model Driven Architecture [chapter]

Aniruddha Gokhale, Balachandran Natarajan
2002 Lecture Notes in Computer Science  
A promising solution to remedy these problems is to use the Model-Integrated Computing (MIC) paradigm to model the resource and QoS requirements of grid applications and integrate it with grid component  ...  These low-level concerns increase the accidental complexities incurred developing complex grid applications.  ...  These two levels of models can be differentiated as follows: -The PIMs describe at a high-level how applications will be structured and integrated, without concern for the middleware/OS platforms or programming  ... 
doi:10.1007/3-540-36124-3_43 fatcat:ratbak3x3bbkbeo57itxr4csqa

A business model for dynamic composition of telecommunication web services

R. Karunamurthy, F. Khendek, R.H. Glitho
2007 IEEE Communications Magazine  
From the perspective of telecommunication providers to deliver integrated composite service from different providers and different network protocols, this paper is aimed to present the current service  ...  With the adoption of SOA (Service Oriented Architecture) that enables service capability interfaces to be published and integrated with other service capabilities into new composite service, service composition  ...  Acknowledgement We would like to thank the sponsor for the research project  ... 
doi:10.1109/mcom.2007.382658 fatcat:5lqncradujasjmcypfsra4p3fu

Turning Web Applications into Mashup Components: Issues, Models, and Solutions [chapter]

Florian Daniel, Maristella Matera
2009 Lecture Notes in Computer Science  
As a bridge toward Web 2.0, in this paper we show how, thanks to the adoption of suitable models and abstractions, generic web applications can comfortably be turned into mashup components.  ...  Sometimes it looks like development for Web 2.0 is completely detached from the "traditional" world of web engineering.  ...  A Model for Mashup Components Mashups are typically characterized by the integration of a variety of different components available on the Web.  ... 
doi:10.1007/978-3-642-02818-2_4 fatcat:kizl45h6jbgtzoamlp2laduek4

Web service access management for integration with agent systems

B. J. Overeinder, P. D. Verkaik, F. M. T. Brazier
2008 Proceedings of the 2008 ACM symposium on Applied computing - SAC '08  
This paper identifies the need for controlled access to such services, from the perspective of agent systems (and not as is generally the case by web service providers).  ...  In addition to a model for web service access regulation, an implementation of a middleware component for web services access regulation based on SOAP and described in WSDL is presented.  ...  Acknowledgements The authors thank dr. Michel Oey for his valuable contributions. This research is supported by the NLnet Foundation, http:// www.nlnet.nl.  ... 
doi:10.1145/1363686.1364135 dblp:conf/sac/OvereinderVB08 fatcat:e3xu6vtixjdblcv3zlu4wws4ge

How languages can save distributed computing

Andrew C. Myers
2013 Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages - POPL '13  
that specify the confidentiality and integrity of information manipulated by the program.  ...  The security of the system is enforced both statically and dynamically by using these policies to control information flow.  ...  Fabric eliminates much of the complexity of the current web-based distributed programming model, by raising the level of abstraction at which applications are developed.  ... 
doi:10.1145/2429069.2429107 dblp:conf/popl/Myers13 fatcat:ifnyjqc3izfzbb7oykiue2rery

Flexible security configuration for virtual machines

Sandra Rueda, Yogesh Sreenivasan, Trent Jaeger
2008 Proceedings of the 2nd ACM workshop on Computer security architectures - CSAW '08  
We develop a web application using our architecture and show that we can configure application VMs in such a way that we can verify the enforcement of the security goals of those applications.  ...  Some VM systems include flexible policy models and some enable MLS enforcement, but the flexible use of policy to control VM interactions has not been developed.  ...  In this model, we assume that the level of assurance provided by the Jif browser and SELinux operating system is enough to allow the same Browser VM to access different web servers, at different secrecy  ... 
doi:10.1145/1456508.1456515 dblp:conf/ccs/RuedaSJ08 fatcat:7rk6zvwfabhn7cp7kvgpev7jte

ReasoNet: Inferring Network Policies Using Ontologies

Charalampos Rotsos, Arsham Farshad, Daniel King, David Hutchison, Qianru Zhou, Alasdair J. G. Gray, Cheng-Xiang Wang, Stephen McLaughlin
2018 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)  
We demonstrate the ability of ReasoNet to automate state verification and cross-layer debugging, through the implementation of two popular control applications, a learning switch and a QoS policy engine  ...  Modern SDN control stacks consist of multiple abstraction and virtualization layers to enable flexibility in the development of new control features.  ...  We would also like to specially thank Dr Vatsala Nundloll for sharing her pearls of wisdom with us during the development of the ontology.  ... 
doi:10.1109/netsoft.2018.8460050 dblp:conf/netsoft/RotsosFKHZGWM18 fatcat:pls4urpm3jb6vaihfvlv5fglni

Integration of a Security Product in Service-Oriented Architecture

Aleksander Dikanski, Christian Emig, Sebastian Abeck
2009 2009 Third International Conference on Emerging Security Information, Systems and Technologies  
The question remains how to implement the security services using traditional security products and how to map security policies defined at service level to product-specific policies.  ...  The future of enterprise software development lies in the use of a service-oriented architecture (SOA) to support business concerns.  ...  of one policy to multiple Web services.  ... 
doi:10.1109/securware.2009.8 dblp:conf/securware/DikanskiEA09 fatcat:gkzrkk72pnghtng4ldh46wl6jm

Realizing Automatic Conversion of Service Models into Web Services towards Dynamic and Adaptive Business Process Management

Teshome Bekele
2011 International Journal of e-Education, e-Business, e-Management and e-Learning  
Hence, in this paper we discussed the collaborative BPM trends and concepts, technologies and proposed a generic framework to realize automatic conversion of service models into Web services in order to  ...  of web service and its enabling available technologies for implementation.  ...  Web Services hold the promise of considerable gains for many organizations by giving them the opportunity to develop techniques to effectively integrate disparate applications by leveraging computer technology  ... 
doi:10.7763/ijeeee.2011.v1.32 fatcat:7vrql3qyprgile6bvbcg7zbvnq

Rich Services: The Integration Piece of the SOA Puzzle

Matthew Arrott, Barry Demchak, Vina Errnagan, Claudiu Farcas, Emilia Farcas, Ingolf H. Kriiger, Massimiliano Menarini
2007 IEEE International Conference on Web Services (ICWS 2007)  
One of the key challenges to successful systems-ofsystems integration using Web services technologies is how to address crosscutting architectural concerns such as policy management, governance, and authentication  ...  To address this challenge, this article introduces the notion of a Rich Service, an extension of the standard service notion, based on an architectural pattern that allows hierarchical decomposition of  ...  application services, which may require multiple levels of hierarchy.  ... 
doi:10.1109/icws.2007.155 dblp:conf/icws/ArrottDEFFKM07 fatcat:xlvz7vaobrgvxc4abctcuwuvb4

A framework for eGovernance solutions

P. A. Mittal, M. Kumar, M. K. Mohania, M. Nair, N. Batra, P. Roy, A. Saronwala, L. Yagnik
2004 IBM Journal of Research and Development  
The framework enables development, configuration, integration, and management of solutions at a higher semantic level.  ...  This includes the ability to customize interfaces for multiple local languages used in government transactions and to customize workflows to conform to the organizational structure and policies to manage  ...  Acknowledgments The authors wish to thank Dilip Antony Joseph, Manish Bhide, Ajay Gupta, Mukul Joshi, and Shree Raman for their contribution in developing the policy management aspects of the framework  ... 
doi:10.1147/rd.485.0717 fatcat:vxbkyz3ckvfwtfdlwnusiycfya

Web services security evaluation considerations

Elias Pimenidis, Christos K. Georgiadis
2009 International Journal of Electronic Security and Digital Forensics  
Web services development is a key theme in utilisation of the commercial exploitation of the semantic web.  ...  The authors attempt to address the issues of security requirements and evaluation criteria, while they discuss the challenges of security implementation through a simple web service application case.  ...  Finally, it may encrypt data of less importance. Because it is separate from the web service, the XML firewall is able to provide security for multiple web service applications.  ... 
doi:10.1504/ijesdf.2009.027520 fatcat:fxcxxkiaofeprh6a3e772ytfji

Access Control as a Service for Information Protection in Semantic Web based Smart Environment

Isma Farah Siddiqui, Scott Uk-Jin Lee
2016 Journal of Internet Computing and services  
The proposed approach allows the adaptation of authorization of information at component level and provides scalable solution for authorization policies and rule enforcement within smart environment.  ...  Smart environments are integrated with Semantic Web to provide context-awareness to the processed information.  ...  To best of our knowledge, the mentioned policies related to XACML are yet not integrated to smart environment with Semantic Web technologies.  ... 
doi:10.7472/jksii.2016.17.5.09 fatcat:6tww6xnrejaidiopeuugpfcwyi

User-Centered Security Management Of Api-Based Data Integration Workflows

Bojan Suzic
2017 Zenodo  
We furthermore consider the perspective of integration clients that access and process distributed resources on behalf of resource owners, providing the model for discovery, integration and fine-grained  ...  Our contribution is examined on a basis of the focused prototype that allows proxy-based integration with existing systems and web authorization protocols.  ...  The members of this class represent entities at different levels of abstractions, allowing specification of the granularity of resource sharing and application of (pre)processing operations at multiple  ... 
doi:10.5281/zenodo.1095756 fatcat:v4ca6qqnlvelbeeeinist7vama
« Previous Showing results 1 — 15 out of 206,988 results