Semantic scheme to extract attack strategies for Web service network security

Author(s):  
Wei Yan ◽  
Fang Liu
2019 ◽  
Vol 3 (2) ◽  
pp. 126
Author(s):  
Astika Ayuningtyas ◽  
Yuliani Indrianingsih

The National Education Standards Agency's (BSNP) curriculum requires in principle the active participation of students in collecting information from various media, including one on the Internet. The role of schools, especially teachers, in providing sources of materials is also very necessary. The Internet is one of the means of information essential to the learning process. Therefore, setting up a digital hardware service network can be an effective learning tool. Digital hardware services can be mutually integrated between schools to obtain a variety of physical resources. The existence of a web service can integrate subject data into each school and can provide distributed information to many providers and service users according to the needs of each user. The Web service is different from a search engine system that does not provide the necessary data integration on hardware service systems that connect data between schools to be distributed to users according to their needs. The web service technology that is built is able to integrate the subject's service material and can be distributed to many users with different needs.


Author(s):  
Min Shi ◽  
Yuan Zhuang ◽  
Yufei Tang ◽  
Maohua Lin ◽  
Xingquan Zhu ◽  
...  

2014 ◽  
Vol 610 ◽  
pp. 559-567
Author(s):  
Yong Kui Liu ◽  
Lin Zhang ◽  
Fei Tao ◽  
Long Wang

With the rapid growth of Web services on the Internet, the atomic Web services as nodes and their functionality dependency relationships as edges form a complex Web service network. Various interactions between Web services can occur along the edges, such as collaboration, competition and substitution, etc. So far, however, there lack of an effective and scalable model for generating Web service interaction networks capturing the aforementioned types of interactions, which hinders the relevant researches such as development of new service composition algorithms and the investigation of evolution mechanisms of service networks. In this paper, we propose a model which is able to generate two types of Web service interaction networks, namely complementary Web service interaction network (CWSIN) and similar Web service interaction network (SWSIN). We show that CWSIN exhibits some of the typical characteristics reported in the previous empirical studies.


2014 ◽  
Vol 608-609 ◽  
pp. 507-511
Author(s):  
Zhi Zhang

This article analyses in detail the safety hazards and risks among all levels of the enterprise from the point of view of the structure, there may be in accordance with the overall balance, principle, technology integration, propose a network security requirements of the enterprise, and further puts forward a whole network security solutions. Moreover, the paper takes Web service composition documents as the research object, through the analysis of the server, the port and address on the Web file, to establish Web intrusion detection model. The core of the model is the monitoring of host resources in Web server, finally discusses in detail the design and Realization of resource monitoring system.


Sign in / Sign up

Export Citation Format

Share Document