Security of Web Services: Methods and Contrivance
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2015, Vol 14, Issue 11
Abstract
The increasing use of web services, the proved advantages of service-oriented architectures and continuously appliedattacks to them require utilization of given secure mechanisms that ensure the security at different levels. The aim of thepaper is to summarize the existing threats and attacks to web applications and web services. Contemporary securitystandards and good practices describing methods and contrivance for deciding security problems are explored too toreveal the present state in the field.
Authors and Affiliations
Malinka Ivanova
Gaming Concepts for Tackling Societal Challenges: A Preliminary Survey and Analysis
Governments, and to a certain extent non-governmental organizations, around the world have to continuously deal with complex and dynamic societal challenges. One approach that has gained increasing popularity over the la...
Design of Phase Shift Control For Transmit/ Receive Module of ST Radar
The paper mainly focuses on the beam forming and its analysis for planar phased- array antenna, which is being developed as part of the ST Radar. The beam steering is done electronically by controlling the phase of the T...
ANALYSIS AND SYNTHESIS OF ENHANCED BEE COLONY OPTIMIZATION WITH THE TRADITIONAL BEE COLONY OPTIMIZATION TO SOLVE TRAVELLING SALES PERSON PROBLEM
Bee colony optimization is the recent swarm intelligence technique which has been applied to solve many combinatorial problems. In this paper we propose the enhanced bee algorithm based on Kmeans clustering to solve TSP....
Compared Between Ipv6 And With Ipv4,Differences And Similarities
This paperprovides Advantages of using IPv6 andcomparison of IPv4 and IPv6,For that, it’s critical to understand the differences and similarities, Some points in the near future when the sheer size of billions new device...
Secure SDN Framework for Data Exfiltration via Video Steganography
The popularity of steganography in the data exfiltration of private corporate sensitive data is increased. So it is important to detect such malicious activity. Becausethe data being transferred can hide the large amount...