Secure Web Service Using Call by Contract
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3
Abstract
A methodology for designing and composing services in a ecure manner. In particular, it’s concerned with safety roperties of service behavior. Services can enforce security olicies locally and can invoke other services that respect given security contracts. This call-by- contract mechanism offers a ignificant set of opportunities, each driving secure ways to ompose services. In this paper its discuss how we can orrectly plan service compositions in several relevant classes of services and security properties. With this aim, we propose a graphical modeling framework based on a foundational alculus called formalism features the dynamic and static emantics, thus allowing for formal reasoning about systems. tatic analysis and model checking echniques provide the esigner with useful information to assess and fix possible ulnerabilities Such as Web services, call-by-contract, nguagebased security, static analysis, system verification.
Authors and Affiliations
R. Ashitha
Integrations of Remote Sensing and GIS to Land Use and Land Cover Change Detection of Coimbatore District
Changes in Land use and land Cover is a dynamic process taking place on the surface, and the spatial distribution of the changes that have taken place over a period of time and space is of immense importance in many a na...
Ambient Noise Tomography of the Central India
In the recent years, earthquakes have been used in understanding the Earth. The travel times of the body waves; P and S waves, the dispersion of the group and phase velocities of the surface waves and the information der...
Channel Modeling of Human Somatosensory Nanonetwork: Body Discriminative Touch and Proprioception Perspective
Nanonetwork design and analysis has become a very interesting topic in recent years. Though this area of research is in its formative stage, it definitely posses a strong integrity in finding out numerous applications in...
DMSA TECHNIQUE FOR FINDING SIGNIFICANT PATTERNS IN LARGE DATABASE
Frequent pattern mining in databases plays a vital role in many data mining tasks like classification, sequential patters, clustering, association rules analysis etc. There are numerous mining algorithms for finding asso...
Cluster Based Message Dissemination for Broadcasting the Emergency/Warning Messages using a Novel Scheduling in VANETS
Vehicular ad hoc networks are a special case of mobile ad hoc networks (MANETs). Unlike MANETs, VANET nodes are moving very fast. It becomes quite challenging to maintain a stable path for broadcasting Emergency and Warn...