Secure Web Service Using Call by Contract
|
|
|
- Susan Chambers
- 10 years ago
- Views:
Transcription
1 Secure Web Service Using Call by Contract R.Ashitha Department of Computer Science Engineering Anna University Tiruchirappalli, Tamilnadu, India Abstract A methodology for designing and composing services in a secure manner. In particular, it s concerned with safety properties of service behavior. Services can enforce security policies locally and can invoke other services that respect given security contracts. This call-by- contract mechanism offers a significant set of opportunities, each driving secure ways to compose services. In this paper its discuss how we can correctly plan service compositions in several relevant classes of services and security properties. With this aim, we propose a graphical modeling framework based on a foundational calculus called formalism features the dynamic and static semantics, thus allowing for formal reasoning about systems. Static analysis and model checking techniques provide the designer with useful information to assess and fix possible vulnerabilities Such as Web services, call-by-contract, languagebased security, static analysis, system verification. Keywords Call by contract, Hash table filtering, Systolic Array, Transaction trimming filter I.INTRODUCTION The execution of a program may involve accessing security-critical resources and these actions are logged into histories. The security mechanism may inspect these histories and forbid those executions would violate the prescribed policies. Service composition heavily depends on which information about a service is made public, on how those service match than user s requirements can be chosen and on their actual runtime behavior. Security makes service composition even harder. Services may be offered by different providers which only trust each other. On the other hand providers have to guarantee that the delivered service respects a given security policy in any interaction with the operational environment, regardless of who actually called the service. On the other hand, client may want to protect their sensitive data from the service invoked. Security is a major concern in extensible software systems such as Java Virtual Machine and common language runtime. These system aim to enable simple, classic applets and also, for example, distributed applications, web services, and programmable networks, with applications, web services and programmable networks with appropriate security expectations. Accordingly, they feature elaborate constructs and mechanisms for associating rights with code, including for determining the run-time rights of piece of code as a function of the state of the execution stack. These mechanisms prevent many security holes, but they are inherently partial and they have proved difficult to use reliably. Motivated and described a new model for assigning right to code: in short, the run time rights of a piece of code that have run and any explicit request to augment rights. This history base model addresses security concerns avoiding pitfalls. Analyzing the model in detail; in particular, discuss its relation to the stack-based model and to the policies and mechanisms of underlying operating systems and consider implementation techniques. In support of the model, also introduced and implemented high level constructs for security, which should be incorporated in libraries or in programming languages. The formalism features dynamic and static semantics, thus allowing for formal reasoning about systems, Static analysis and model checking technique provide the designer with useful information to assess and fix possible vulnerabilities, A service oriented computing modeling framework supporting history based security and call by contract. The ISSN :
2 distinguishing feature of the modeling framework is it provides high level constructs abstracting from the underlying middleware for service programming and deploying. The main result is a semantic-based methodology for synthesizing the skeleton structure of the orchestration engine, The orchestration plan details which services the orchestration engine has to choose in order to complete the original task while obeying the security policies on demand. Here dealt with security policies, but our methodology can be applied to handle variety of nonfunctional safety constraints. (a)hash table filtering II.TEQUNIQUE USED To build a hardware hash table filter, we use a hash value generator and hash table updating module. The former generates all the k-itemset combinations of the transactions and puts the k-itemsets into the hash function to create the corresponding hash values. As shown in Fig. 9, the hash value generator comprises a transaction memory, a state machine, an index array, and a hash function. The transaction memory stores all the items of a transaction. The state machine is the controller that generates control signals of different lengths k = {2; 3...} flexibly. Then, the control signals are fed into the index entry of the index array is the ith item in a k-itemset. By changing the values in the index array, the state machine can generate different combinations of k- itemsets from the transaction. The procedure starts by loading a transaction into the transaction memory. Then, the values in the index array are reset, and the state machine starts to generate control signals. The values in the index array are changed by the different states. Each item in the generated itemset is passed to the hash function through the multiplexer. The hash function takes some bits from the incoming k- itemsets to calculate the hash values. Consider the example in Fig. 9. We assume the current k is 3. The first three index entries in the index array are used in this case. The transaction fa;c;e; F;Gg is loaded into the transaction memory. The values in the index array are initiated to 0, 1, and 2, respectively, so that the first itemset generated is < ACE >. Then, the state machine changes the values in the index array. The following numbers in the index array will be < 0; 1; 3 >, < 0; 1; 4 >, < 0; 2; 3 >, < 0; 2; 4 >, to name a few. Therefore, the corresponding itemsets are < ACF >, < ACG >, < AEF >, < AEG >, and so on. The hash values generated by the hash value generator are passed to the hash table updating module. array. To generate a k-itemset, the first k entries in the index array are utilized. The values in the index array are the indices of the transaction memory. The item selected by the ith To speed up the process of hash table building, we utilize Nparallel hash value generators so that the hash values can be generated simultaneously. In addition, the hash table is divided into several parts to increase the throughput of hash table building. Each part of the hash table contains a range of hash values, and the controller passes the incoming hash values to the buffer they belong to. These hash values are taken as indexes of the hash table to accumulate the values ISSN :
3 in the table, as shown in Fig. 10. There are four parallel hash value generators. The size of the whole hash table is 65,536, and it is divided into four parts. Thus, the range of each part is 16,384. If the incoming hash value is 5, it belongs to the first part of the hash table. The controller would pass the value to buffer 1. If there are parallel accesses to the hash table at the same time, only one access can be executed. The others will be delayed and be handled as soon as possible. The delayed itemsets are stored in the buffer temporally. Whenever the access port of hash table is free, the delayed itemsets are put into the hash table. After all the candidate k-itemsets have been generated, they are pruned by the hash table filter. Each candidate itemset is hashed by the hash function. By querying the number of itemsets in the bucket with the corresponding hash value, the candidate itemset is pruned if the number of itemsets in the bucket does not meet the minimum support criteria. Therefore, the number of the candidate itemsets can be reduced effectively with the help of the hash table filter (b)systolic Array A systolic array is an arrangement of processors in an array where data flows synchronously across the array between neighbors usually with different data flowing in different directions. Each processor at each step takes in data from one or more neighbors (e.g. North and West), processes it and, in the next step, outputs results in the opposite direction (South and East). H. T. Kung and Charles Leiserson were the first to publish a paper on systolic arrays in 1978, and coined the name. Systolic array is specialized form of parallel computing with multiple processors connected by short wires, unlike many forms of parallelism which lose speed through their connection. Cells(processors), compute data and store it independently of each other Systolic unit is an independent processor in which every processor has some registers and an ALU. The cells share information with their neighbors, after performing the needed operations on the data. Some simple examples of systolic array models. R.Ashitha / (IJCSE) International Journal on Computer Science and Engineering ISSN :
4 Systolic is extremely fast, easily scalable architecture and can do many tasks single processor machines ISSN :
5 cannot attain Turns some exponential problems into linear or polynomial time. (c) The theoretical backgrounds of the pruning scheme are based on the following two theorems which were presented. Theorem 1. A transaction can only be used to support the set of frequent (k+1)-itemsets if it consists of at least (k+1) candidate k-itemsets. reduced. In the HAPPI architecture, the trimming information records the frequency of each item in a transaction that appears in the candidate itemsets. The support counting and trimming information collecting operations are similar since they all need to compare candidate itemsets with transactions. Therefore, in addition to transactions in the database, their corresponding trimming information is also fed into the systolic array in another pipe, while the support counting process is being executed. As shown in Fig. 7, a trimming vector is embedded in each hardware cell of the systolic array to record items that are matched with candidate itemsets Theorem 2. An item in a transaction can be trimmed if it does not appear in at least k of the candidate k- itemsets contained in the transaction While the support counting procedure is being executed, the whole database is streamed into the systolic array. However, not all the Fig. 7. An example of streaming a transaction and the corresponding trimming information into the cell. (a) Stream a transaction into the cell.(b) Stream trimming information into the cell. The ith flag in the trimming vector is set to true if the ith item in the transaction matches the candidate itemset. After comparing the candidate itemset with all the items in a transaction, if the candidate itemset is a subset of the transaction, the incoming corresponding trimming information will be accumulated according to the trimming vector. Since transactions and trimming information are input in different pipes, support counters and trimming information can be updated simultaneously in a hardware cell. In Fig. 7a, the candidate itemset < BC > is stored in the candidate memory, and a transaction {A;B;C;D;E} is about to be fed into the cell. The resultant trimming vector after comparing < BC > with all the items in the transaction is shown in Fig. 7b. Because items B and C are matched with the candidate itemset, the trimming vector becomes < 0; 1; 1; 0; 0 >. Meanwhile, the corresponding trimming information is fed into the trimming register, and the trimming information is updated from < 0; 1; 1; 0; 1 > to < 0; 2; 2; 0; 1 >. After passing through the systolic array, transactions and their corresponding trimming information are passed to the trimming filter. The filter trims off items whose frequencies are less than k. As the example in Fig. 8 shows, the trimming information of the transaction {A;B;C;D;E}is < 2; 2; 2; 1; 2 > and the current k is 2. Therefore, the item D should be trimmed. The new transaction becomes {A;B;C;D}. In this way, the size of the database can be reduced. The trimmed transactions are sent to the hash table filter module for hash table building. ISSN :
6 (a) III PHASES Semantics of Services That the services that initiate a computation are furnished with an arbitrary plan. In the next section, we shall discuss static machinery that will enable us to construct these plans to guarantee that computations will never go wrong, that is, they satisfy all of the contracts and the security policies on demand. We shall also show some strategies to adopt when services disappear unexpectedly. The graphrewriting semantics for the case of dependent threads is split into two parts: basic activities, events, security blocks, requests, and returns.details the rules that involve planning and recovering strategies, that is, planning blocks, requests to unavailable services, unresolved requests, services going down and up, and publication of new services. We shall briefly discuss the case of independent threads later in this section. All of the remaining axes in the taxonomy are covered by our semantics. When irrelevant, we omit the label in services. Note that the actual values for some labels in rules REQ and RET are defined later on, since they depend on the choice made on the security aspects discussed. This gives rise to different behaviors of requests and returns according to the possible choices in the taxonomy (b)network composed A network composed of two services at locations, both stateful and sharing a global history. The service at starts with an action (the omitted target object is immaterial in this example) and then issues a request, resolved by the provided plan. The service at performs within a security block, where the policy prevents from being fired twice. A computation of the network is depicted, where we assume that the execution monitor is on. Note that the plan is not viable because it drives a computation that fails because of an attempted security violation right before the second is fired. (c)independent Threads To model independent threads, each service must keep a separate history for each thread. Equivalently, we keep a history for each thread initiator. With this aim, instead of a single history, services now carry a function mapping the label of each initiator to its corresponding history. Moreover, we keep track of the initiator name: Each service invoked on behalf of the initiator is tagged as such. The semantics of services can now be easily adapted, making play the role of in the semantics for dependent threads. The rule REQ for independent threads. (d)security policies Security policies are regular properties of histories and they are defined through template security automata. A template security automaton gives rise to a finite-state automaton when the parameter x is instantiated to an actual object o. These automata will be exploited to recognize those histories obeying. IV.EXPERIMENTAL RESULTS In this paper consider the example of such transactions, pay-pal-system in purchasing items, form an increasingly important sector within the retail economy and are usually conducted by customers entering relevant details, such as credit card number, name etc, on a form-page of a vendor\'s website. Alternatively it is possible to rely on the vendor having stored those details from a previous transaction, so as to simplify subsequent purchases from that customer. A stateless service does not preserve its history across distinct invocations (yet it checks the history within each invocation). Instead, a stateful service keeps track of the histories of all the past invocations. Stateless services can enforce policies that inspect the history of the current invocation only, for example, resource usage control. Stateful services allow for more expressive security policies. For instance, a stateful service can bound the number of invocations on a per-client basis, whereas a stateless service cannot. More generally, stateful services can exploit their histories to record security-relevant information about the state of client sessions. Consider, for instance, a service that requires password authentication and that gives only three chances per hour to authenticate. This can be modeled as a stateful service. In this case, the history keeps track of the number of failed authentication attempts. The security policy prevents the service from being used by a caller for which the history has recorded three failed authentication attempts in the last hour. ISSN :
7 Although stateless services admit security policies that are less expressive than those of stateful services, static analysis can usually infer enough information to ensure secure composition. Security is of paramount importance in conducting such transactions, since access to the account details of a legitimate customer can be exploited for fraudulent purposes such as the manufacture of fake cards etc. If account details are transmitted over internet connections in an unencrypted form, an eavesdropper with access to an intermediate router can access these sensitive details. Alternatively, fake look-a-like websites can lure innocent customers into providing their account details in the belief that they are communicating with a reputable vendor. Finally, it is not usual for the web-servers of legitimate traders to become the subject of attacks, as a result of which databases of previously stored account details can be compromised. To guard against many of these attacks, web-traders commonly employ Secure Sockets Layer (SSL)- protected servers. These address some, but not all, of the security threats by encrypting communications between the customer and the web-server, and also serve to ensure that the web-server must present a digital certificate which associates its identity with a cryptographic public key. It is also noted that many customers find the process of entering details on web-forms confusing and error prone, and the invention serves to ease these difficulties also. That is, currently, when a customer uses its web browser to access a sales website presented by an e-commerce server, the customer and device are anonymous to the server. An SSL connection is setup between the browser in the PC or other terminal device used by the customer. The customers can, by using the SSL protocol, verify the authenticity of the server because it is part of a Public Key Infrastructure (PKI) and the server then presents a certificate which chains-back to a root certificate stored in the customer (client) browser. The customer\'s device can then choose a random value, send it to the server encrypted under its certified public key, and use it as a basis for the computation of symmetric keys used to provide confidentiality and integrity of the information that the customer wishes to send to the server. As far as the e-commerce server is concerned, this information has come from an anonymous source, and the vendor then seeks authorization from the credit card company based on creditworthiness, card validity, security checks on supplied billing address etc. However no steps have been taken to authenticate the source of the information by either user authentication or device authentication. The authorization process is arranged simply to check that it looks like a valid order. V.RELATED WORK Several approaches have been developed to support the verification of service-oriented systems. For example, dynamic bisimulation-based techniques have been adopted to analyze the consistency between orchestration and choreography of services [21], [22], whereas state-space analysis has been exploited to check the correctness of service orchestration [31]. Our approach allows for synthesizing and checking the correctness of the orchestration statically. Process calculus techniques have been used to formalize Web Services standards (for example, see [28], [18], [35], [37], [23]). A different approach is [38], an abstract programming model for structured orchestration of services. Web service authentication has been recently modeled and analyzed in [14], [15] through a process calculus enriched with cryptographic primitives. From a software engineering perspective, the advent of serviceoriented applications has led to the development of service interfaces and orchestration (business) logic and abstract from the underlying programming middleware. A well-known example is provided by the Service Component Architecture (SCA) [24]. This framework aims at simplifying implementations by allowing designers to focus only on the business logic while complying with existing standards. Our approach complements the SCA view, providing a full-fledged mathematical framework for designing and verifying properties of service assemblies. It would be interesting to develop a (modeltransformation) mapping from our formal framework to SCA. In addition, related to our approach is the work on SRML [29], a high-level core language, independent of the underlying programming middleware. SRML has a mathematical semantics, providing and offers both syntactic and ISSN :
8 behavioral service interfaces. The logic for the specification of behavioral properties of services is still under development. The interconnections between services are specified in a declarative style, but they are not driven by the properties of a contract, as is proposal. REFERENCES [1] Massimo Bartoletti, Pierpaolo Degano, Gian Luigi Ferrari, and Roberto Zunino Semantic based design on secure web service 2008 [2] M. Abadi and C. Fournet, Access Control Based on Execution History, Proc. 10th Ann. Network and Distributed System Security Symp., [3] S. Anderson et al., Web Services Trust Language (WS- Trust), technical report, [4] B. Atkinson et al., Web Services Security (WS- Security), technical report, [5] A. Banerjee and D.A. Naumann, History-Based Access Control and Secure Information Flow, Proc. Workshop Construction and Analysis of Safe, Secure, and Interoperable Smart Cards, [6] H.P. Barendregt et al., Term Graph Rewriting, Parallel Languages on PARLE: Parallel Architectures and Languages Europe, [7] M. Bartoletti, P. Degano, and G.L. Ferrari, History Based Access Control with Local Policies, Proc. Eight Int l Conf. Foundations of Software Science and Computation Structures, [8] M. Bartoletti, P. Degano, and G.L. Ferrari, Planning and Verifying Service Composition, Technical Report TR-07-02, Dept. of Informatics, Univ. of Pisa, 2007, J. Computer Security, to appear. [9] M. Bartoletti, P. Degano, G.L. Ferrari, and R. Zunino, Types and Effects for Resource Usage Analysis, Proc. 10th Int l Conf. Foundations of Software Science and Computation Structures, [10] M. Bartoletti, P. Degano, and G.L. Ferrari, Enforcing Secure Service Composition, Proc. 18th Computer Security Foundations Workshop, R.Ashitha / (IJCSE) International Journal on Computer Science and Engineering ISSN :
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
A standards-based approach to application integration
A standards-based approach to application integration An introduction to IBM s WebSphere ESB product Jim MacNair Senior Consulting IT Specialist [email protected] Copyright IBM Corporation 2005. All rights
Challenges and Opportunities for formal specifications in Service Oriented Architectures
ACSD ATPN Xi an China June 2008 Challenges and Opportunities for formal specifications in Service Oriented Architectures Gustavo Alonso Systems Group Department of Computer Science Swiss Federal Institute
Stream Processing on GPUs Using Distributed Multimedia Middleware
Stream Processing on GPUs Using Distributed Multimedia Middleware Michael Repplinger 1,2, and Philipp Slusallek 1,2 1 Computer Graphics Lab, Saarland University, Saarbrücken, Germany 2 German Research
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Information and Communications Technology Courses at a Glance
Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer
History-based Access Control with Local Policies
Fossacs 05 p.1 History-based Access Control with Local Policies Massimo Bartoletti Pierpaolo Degano Gian-Luigi Ferrari Dipartimento di Informatica, Università di Pisa Fossacs 05 p.2 Mobile code security
Chapter 8 A secure virtual web database environment
Chapter 8 Information security with special reference to database interconnectivity Page 146 8.1 Introduction The previous three chapters investigated current state-of-the-art database security services
Certification Report
Certification Report EAL 4 Evaluation of SecureDoc Disk Encryption Version 4.3C Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification
Digital Identity Management
Digital Identity Management Techniques and Policies E. Bertino CS Department and ECE School CERIAS Purdue University [email protected] Digital Identity Management What is DI? Digital identity (DI)
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: [email protected] ABSTRACT
Introduction to Service Oriented Architectures (SOA)
Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction
Secure Authentication and Session. State Management for Web Services
Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9
NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
What can DDS do for You? Learn how dynamic publish-subscribe messaging can improve the flexibility and scalability of your applications.
What can DDS do for You? Learn how dynamic publish-subscribe messaging can improve the flexibility and scalability of your applications. 2 Contents: Abstract 3 What does DDS do 3 The Strengths of DDS 4
Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip
Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip Ms Lavanya Thunuguntla 1, Saritha Sapa 2 1 Associate Professor, Department of ECE, HITAM, Telangana
Automatic vs. Manual Code Analysis
Automatic vs. Manual Code Analysis 2009-11-17 Ari Kesäniemi Senior Security Architect Nixu Oy [email protected] Copyright The Foundation Permission is granted to copy, distribute and/or modify this
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
CHAPTER THREE, Network Services Management Framework
CHAPTER THREE, Acronyms and Terms 3-3 List of Figures 3-4 1 Introduction 3-5 2 Architecture 3-6 2.1 Entity Identification & Addressing 3-7 2.2 Management Domain Registration and Information Service 3-7
Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.
Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component
TOP SECRETS OF CLOUD SECURITY
TOP SECRETS OF CLOUD SECURITY Protect Your Organization s Valuable Content Table of Contents Does the Cloud Pose Special Security Challenges?...2 Client Authentication...3 User Security Management...3
Driving force. What future software needs. Potential research topics
Improving Software Robustness and Efficiency Driving force Processor core clock speed reach practical limit ~4GHz (power issue) Percentage of sustainable # of active transistors decrease; Increase in #
A Layered Signcryption Model for Secure Cloud System Communication
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1086
MEng, BSc Applied Computer Science
School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions
PART IV Performance oriented design, Performance testing, Performance tuning & Performance solutions. Outline. Performance oriented design
PART IV Performance oriented design, Performance testing, Performance tuning & Performance solutions Slide 1 Outline Principles for performance oriented design Performance testing Performance tuning General
SERENITY Pattern-based Software Development Life-Cycle
SERENITY Pattern-based Software Development Life-Cycle Francisco Sanchez-Cid, Antonio Maña Computer Science Department University of Malaga. Spain {cid, amg}@lcc.uma.es Abstract Most of current methodologies
Real Time Programming: Concepts
Real Time Programming: Concepts Radek Pelánek Plan at first we will study basic concepts related to real time programming then we will have a look at specific programming languages and study how they realize
Desktop Virtualization Technologies and Implementation
ISSN : 2250-3021 Desktop Virtualization Technologies and Implementation Pranit Patil 1, Shakti Shekar 2 1 ( Mumbai, India) 2 (Mumbai, India) ABSTRACT Desktop virtualization is new desktop delivery method
WebEx Security Overview Security Documentation
WebEx Security Overview Security Documentation 8/1/2003: WebEx Communications Inc. WebEx Security Overview WebEx Security Overview Introduction WebEx Communications, Inc. provides real-time communication
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Ontological Identification of Patterns for Choreographing Business Workflow
University of Aizu, Graduation Thesis. March, 2010 s1140042 1 Ontological Identification of Patterns for Choreographing Business Workflow Seiji Ota s1140042 Supervised by Incheon Paik Abstract Business
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
SP 800-130 A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter
SP 800-130 A Framework for Designing Cryptographic Key Management Systems 5/25/2012 Lunch and Learn Scott Shorter Topics Follows the Sections of SP 800-130 draft 2: Introduction Framework Basics Goals
Enhance Service Delivery and Accelerate Financial Applications with Consolidated Market Data
White Paper Enhance Service Delivery and Accelerate Financial Applications with Consolidated Market Data What You Will Learn Financial market technology is advancing at a rapid pace. The integration of
Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Computing
Stateful Inspection Technology
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
Key Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
Service Oriented Architectures
8 Service Oriented Architectures Gustavo Alonso Computer Science Department Swiss Federal Institute of Technology (ETHZ) [email protected] http://www.iks.inf.ethz.ch/ The context for SOA A bit of history
Client/Server Computing Distributed Processing, Client/Server, and Clusters
Client/Server Computing Distributed Processing, Client/Server, and Clusters Chapter 13 Client machines are generally single-user PCs or workstations that provide a highly userfriendly interface to the
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India
CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,
Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus
Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 4.0.3 Unit objectives
Service-Oriented Architectures
Architectures Computing & 2009-11-06 Architectures Computing & SERVICE-ORIENTED COMPUTING (SOC) A new computing paradigm revolving around the concept of software as a service Assumes that entire systems
Design by Contract beyond class modelling
Design by Contract beyond class modelling Introduction Design by Contract (DbC) or Programming by Contract is an approach to designing software. It says that designers should define precise and verifiable
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction
Real-Time Service Composition and Deployment for Secure Computing in Cloud Environment R. Ushadevi 1, V. Rajamani 2 1 Research Scholar, Department of Computer Applications, St. Peter s University, Chennai
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
The Security Framework 4.1 Programming and Design
Tel: (301) 587-3000 Fax: (301) 587-7877 E-mail: [email protected] Web: www.setecs.com Security Architecture for Development and Run Time Support of Secure Network Applications Sead Muftic, President/CEO
INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY
INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY Asst.Prof. S.N.Wandre Computer Engg. Dept. SIT,Lonavala University of Pune, [email protected] Gitanjali Dabhade Monika Ghodake Gayatri
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,
Threat Model for Software Reconfigurable Communications Systems
Threat Model for Software Reconfigurable Communications Systems Presented to the Management Group 6 March 007 Bernard Eydt Booz Allen Hamilton Chair, SDR Security Working Group Overview Overview of the
Using mobile phones to access Web Services in a secure way. Dan Marinescu
Using mobile phones to access Web Services in a secure way Dan Marinescu March 7, 2007 Abstract Web Services is a technology that has gained in acceptance and popularity over the past years. The promise
Secure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Trust areas: a security paradigm for the Future Internet
Trust areas: a security paradigm for the Future Internet Carsten Rudolph Fraunhofer Institute for Secure Information Technology SIT Rheinstrasse 75, Darmstadt, Germany [email protected]
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 The Big Data Working Group (BDWG) will be identifying scalable techniques for data-centric security and privacy problems. BDWG s investigation
LISTSERV LDAP Documentation
LISTSERV LDAP Documentation L Soft Sweden AB 2007 28 November 2007 Overview LISTSERV version 15.5 can interface to LDAP servers to authenticate user logins, to insert LDAP attributes in mail merge distributions
Job Reference Guide. SLAMD Distributed Load Generation Engine. Version 1.8.2
Job Reference Guide SLAMD Distributed Load Generation Engine Version 1.8.2 June 2004 Contents 1. Introduction...3 2. The Utility Jobs...4 3. The LDAP Search Jobs...11 4. The LDAP Authentication Jobs...22
Security Overview Introduction Application Firewall Compatibility
Security Overview Introduction ShowMyPC provides real-time communication services to organizations and a large number of corporations. These corporations use ShowMyPC services for diverse purposes ranging
BUSINESS INTELLIGENCE ANALYTICS
SOLUTION BRIEF > > CONNECTIVITY BUSINESS SOLUTIONS FOR INTELLIGENCE FINANCIAL SERVICES ANALYTICS 1 INTRODUCTION It s no secret that the banking and financial services institutions of today are driven by
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter
Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System
Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System ArchanaThange Post Graduate Student, DKGOI s COE, Swami Chincholi, Maharashtra, India [email protected],
Overview of Banking Application Security and PCI DSS Compliance for Banking Applications
Overview of Banking Application Security and PCI DSS Compliance for Banking Applications Thought Paper www.infosys.com/finacle Universal Banking Solution Systems Integration Consulting Business Process
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Autodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
ISM/ISC Middleware Module
ISM/ISC Middleware Module Lecture 13: Security for Middleware Applications Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Geoff Sharman Sept 07 Lecture 13 Aims to: 2 Show why
The Service Revolution software engineering without programming languages
The Service Revolution software engineering without programming languages Gustavo Alonso Institute for Pervasive Computing Department of Computer Science Swiss Federal Institute of Technology (ETH Zurich)
Information Technology Policy
Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review [email protected]
SOFT 437. Software Performance Analysis. Ch 5:Web Applications and Other Distributed Systems
SOFT 437 Software Performance Analysis Ch 5:Web Applications and Other Distributed Systems Outline Overview of Web applications, distributed object technologies, and the important considerations for SPE
Design and Implementation of an Open Ended Automated Vault Security System
Design and Implementation of an Open Ended Automated Vault Security System Saunak Mitra Sarit Hati Diganta Sengupta Indraneel Datta Pratim Sinha Roy Soumyanil Banerjee Future Institute of Engineering and
MEng, BSc Computer Science with Artificial Intelligence
School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give
COMP5426 Parallel and Distributed Computing. Distributed Systems: Client/Server and Clusters
COMP5426 Parallel and Distributed Computing Distributed Systems: Client/Server and Clusters Client/Server Computing Client Client machines are generally single-user workstations providing a user-friendly
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
Cloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.
IT Architecture Review. ISACA Conference Fall 2003
IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture
