[图书][B] Security for web services and service-oriented architectures

E Bertino, L Martino, F Paci, A Squicciarini - 2010 - Springer
Web services technologies are advancing fast and being extensively deployed in many di?
erent application environments. Web services based on the eXt-sible Markup Language …

Underwater image enhancement by attenuation inversionwith quaternions

F Petit, AS Capelle-Laizé… - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
In this paper, an underwater image enhancement method using quaternions is presented.
This work aims to improve color rendition and contrast of the objects, as if the scene has …

Lifecycle design and support of intelligent web-based service systems

JPT Mo, W Lorchirachoonkul - International Journal of Agile …, 2016 - inderscienceonline.com
The internet provides the opportunity for many web-based systems to be developed for
specific business and service purposes. However, the support for this type of system is …

The SCIFC model for information flow control in web service composition

W She, IL Yen, B Thuraisingham… - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
Existing Web service access control models focus on individual Web services, and do not
consider service composition. In composite services, a major issue is information flow …

Purpose-based privacy preserving access control for secure service provision and composition

M Amini, F Osanloo - IEEE Transactions on Services Computing, 2016 - ieeexplore.ieee.org
Two main security issues in software as a service (SaaS) delivery model of cloud
environments are access control and privacy preserving in basic web services as well as …

[PDF][PDF] Forensics investigation of web application security attacks

A Lazzez, T Slimani - International Journal of Computer Network and …, 2015 - academia.edu
Nowadays, web applications are popular targets for security attackers. Using specific
security mechanisms, we can prevent or detect a security attack on a web application, but …

Rule-based run-time information flow control in service cloud

W She, IL Yen, B Thuraisingham… - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
Service cloud provides added value to customers by allowing them to compose services
from multiple providers. Most existing web service security models focus on the protection of …

Security-aware service composition with fine-grained information flow control

W She, IL Yen, B Thuraisingham… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Enforcing access control in composite services is essential in distributed multidomain
environment. Many advanced access control models have been developed to secure web …

Security policy composition for composite web services

F Satoh, T Tokuda - IEEE Transactions on Services Computing, 2010 - ieeexplore.ieee.org
An application based on the Service-Oriented Architecture (SOA) consists of an assembly of
services, which is referred to as a composite service. A composite service can be …

Policy-driven service composition with information flow control

W She, IL Yen, B Thuraisingham… - 2010 IEEE International …, 2010 - ieeexplore.ieee.org
Ensuring secure information flow is a critical task for service composition in multi-domain
systems. Research in security-aware service composition provides some preliminary …