IEEE Xplore Search Results

Showing 1-25 of 55 resultsfor

Filter Results

Show

Results

The penetration of digital devices in Smart Grid has created a big security issue. OWASP is an online community of security professionals that identifies the most critical web application security risk in IT domain. Smart Grid also uses client-server based web-applications to collect and disseminate information. Therefore, Smart Grid network is analogous to IT network and similar kind of risk exis...Show More
With advancing technologies, Extensible Markup Language (XML) has become a popular document format that is used by a wide range of applications. This document format is used for storing, exchanging, and representing data across diverse systems and platforms thereby ensuring interoperability in various applications. However, XML parsers are susceptible to a specific vulnerability known as XML Exter...Show More
We present a method for unique renaming declarations and references in Java programs using source transformation to XML markup. Each entity declaration and reference in the Java program is assigned a globally unique identifier (UID) based on its declaration scope and file. The UID serves as a key by which the entity's original declaration and all references can be found, and more importantly, by w...Show More
One of the most important issues in source code analysis and software re-engineering is the representation of software code text at an abstraction level and form suitable for algorithmic processing. However, source code representation schemes must be compact, accessible by well defined application programming interfaces (APIs) and above all portable to different operating platforms and various CAS...Show More
The Extensible Markup Language (XML) is extensively used in software systems and services. Various XML-based attacks, which may result in sensitive information leakage or denial of services, have been discovered and published. However, due to development time pressures and limited security expertise, such attacks are often overlooked in practice. In this paper, following a rigorous and extensive e...Show More
In order to solve the problems of verifying the inconsistency of the requirement specification in the natural language, and automatically transforming the requirement specification in natural language description to formal models, this paper proposes a modeling method of use case specification in XML and a method of verifying inconsistency in the specification. Furthermore, we design a correspondi...Show More
DGL is a language for specifying and generating random data for testing and simulation. Output can take many forms and can be placed in files, mysql databases and C++ internal variables. In many cases, data files containing raw input data are created. The XML feature of DGL simplifies the generation of XML output. The XML data can be stored in an XML file or can be streamed into another program. T...Show More
In a dynamic coalition environment, organizations should be able to exercise their own local fine-grained access control policies while sharing resources with external entities. At the same time, the status of XML as a standard for storing and exchanging data in Internet and XML documents is becoming a de facto standard for storing and exchanging information. So, access control of XML documents is...Show More

Secure JAVA application in SOA-based cross-border PKI mobile government systems

;

Logic Journal of the IGPL
Year: 2013 | Volume: 21, Issue: 4 | Journal Article |
In this article, we describe a possible model of secure cross-border m-government system based on secure JAVA mobile application and SOA-based m-government platform. The proposed model consists of additional external entities/servers, such as: PKI, XKMS, STS, UDDI and TSA. The main parts of the proposed model are secure JAVA mobile application and secure Web Service implemented on the SOA-based pl...Show More

Secure JAVA application in SOA-based cross-border PKI mobile government systems

;

Year: 2013 | Volume: 21, Issue: 4 | Journal Article |
In the business world, financial institutions, like banks and investment firms, heavily rely on technology to manipulate daily operations and support business. Many more business processes have now become automated and require procedures to be approved. For example, when providing business services liked personal / corporate loans, mortgage, or Letter of Credit (LC), a customer is required to subm...Show More
This paper describes design and code generation of dynamic web application. A web application is developed by using open source frameworks. The developed application is based on the data model. The model is created by design and code generation tool. The framework transforms the model into a default web application. So, the framework makes a model alive as a web application, and that model data ma...Show More
With the amount of textual data available on the web, new methodologies of knowledge extraction domain are provided. Some original methods allow the users to combine different types of data in order to extract relevant information. In this context, we present the cornerstone of manipulations on textual documents and their preparation for extracting compatible spatial information with those contain...Show More
Cyber-criminals use distributed denial-of-service attacks (DDoS) and XML denial-of-service attacks (XDoS) to extort money from online service providers. This kind of attacks is normally targeted at a particular service provider to exhaust the network and system resources of the provider. This paper proposes a scheme for building a defense system against DDoS and XDoS attacks. The system is built o...Show More
SOAP-based Web services is a middleware technology marketed as the solution to easy data exchange between heterogeneous IT architectures. The large number of scenarios, in which this technology is used, has introduced demands for new extensions raising its complexity. However, this has also introduced a large variety of new attacks. In this paper, we investigate an automatic evaluation of Web serv...Show More
Source code security is the foundation of software security, so it is of great significance to test source code defects before the software system goes online. This paper first elaborated the causes of source code security defects, and introduced the identification methods and repair measures of source code vulnerabilities in detail. Finally, it described the testing process management of source c...Show More
In order to share, exchange, and process ORM (Object Role Modeling) schemas on Internet and the open connectivity environments, some versions of ORM-ML (ORM Markup Language) have been proposed. However, there still exist some issues need to correct or improve. Based on existing works and researches about meta-model of ORM 2.0, this paper proposed a concise and complete version of ORM-ML.Show More
One of the most important tasks of genome projects is the implementation of experimental data in order to derive biological knowledge from the data. To achieve this goal, researchers typically search external data sources, execute analysis programs on the biosequences, analyze previous annotations and add new annotations to register their interpretation of the data. This paper elicits three functi...Show More
As a part of Web services triangle architecture, UDDI registry takes on the task of service registration and discovery, which plays an important role in the open, distributed and dynamic Web services environment. However, the current UDDI registries cannot meet the needs of practical applications. This paper proposes a domain-oriented UDDI registry architecture and addresses some new concepts such...Show More

Demystifying the threat modeling process

P. Torr

IEEE Security & Privacy
Year: 2005 | Volume: 3, Issue: 5 | Magazine Article |
Cited by: Papers (73)
In today's hostile online environment, software must be designed to withstand malicious attacks of all kinds. Unfortunately, even security-conscious products can fall prey when designers fail to understand the threats their software faces or the ways in which adversaries might try to attack it. To better understand a product's threat environment and defend against potential attacks, Microsoft uses...Show More

Demystifying the threat modeling process

P. Torr

Year: 2005 | Volume: 3, Issue: 5 | Magazine Article |
Online attacks are outcomes of cyber vulnerabilities. XML (eXtensible Markup Language) is a self-descriptive markup language, and XML eXternal Entity injection (XXE) is a well-recognised web security vulnerability. XXE injection can attack web applications that several popular XML parsers are unable to withstand. Most of the available literature on XXE is based on vulnerability testing, but not mu...Show More
We propose a new service modeling and lookup method based on service shaping. In existing service frameworks, assembling ubiquitous services requires application programmers to translate their requirements to the type space defined by service programmers. This translation, however, disables some of user requirements due to abstraction gap and time gap between the user tasks and service types. This...Show More
Until very recently, all Web sites have been built using a syntactic model. Now new semantic Web-based technologies are deployed that enable true interoperability standards. This paper describes why we should consider possibilities of migrating existing applications into semantic Web, and presents possible steps that could be taken in this challenging taskShow More
In organizations today there exists an amplified need for increased integration and collaboration within and across organizational boundaries. With the emergence of Web service technologies, has come a significant architectural shift in service oriented architectures (SOA). Built on pervasive technologies such as HTTP and XML, Web Services has the potential to gain broad adoption over its predeces...Show More