Web services (WS) have become a significant part of the Web because of such attractive features as simple to use, platform independence, and XML/SOAP support. However, these features make WS vulnerable to many new and inherited old security threats. Semantic WS, which are capable of publishing semantic data about their functional and non-functional properties, add even more security issues. Now, it becomes easier to attack WS because their semantic data is publicly available. To register and prevent these attacks, especially distributed attacks, new distributed firewalls and intrusion detection systems (F/IDS) have to be applied. However, these F/IDS can be developed by different vendors and they do not have the way to cooperate with each o...
As the use of the internet for commercial purposes continues to grow, so do the number of security t...
11th International Conference on Metadata and Semantic Research, MTSR 2017 -- 28 November 2017 throu...
Security has preeminent importance in today's technological environment. In recent years, as cyber-a...
Web services (WS) have become a significant part of the Web because of such attractive features as s...
Software systems have become highly distributed and complex involving independent components working...
Software applications become highly distributed and complex, involving independent collaborating com...
Cyber Civilization has become an important source of information sharing and professional activities...
Software applications become highly distributed and complex, involving independent collaborating com...
Web application security is the major security concern for e-business and information sharing commun...
Software systems become increasingly distributed, involving many independent and collaborating compo...
Software systems become increasingly distributed, involving many independent and collaborating compo...
We examine the intersection of data mining and se-mantic web in this paper. We briefly identify some...
The security characteristics of web service based systems depend on those of the individual web serv...
In this paper we address security of semantic Web services that are declaratively described in OWL-S...
Abstract. We state the benefits of transitioning from taxonomies to ontologies and ontology specific...
As the use of the internet for commercial purposes continues to grow, so do the number of security t...
11th International Conference on Metadata and Semantic Research, MTSR 2017 -- 28 November 2017 throu...
Security has preeminent importance in today's technological environment. In recent years, as cyber-a...
Web services (WS) have become a significant part of the Web because of such attractive features as s...
Software systems have become highly distributed and complex involving independent components working...
Software applications become highly distributed and complex, involving independent collaborating com...
Cyber Civilization has become an important source of information sharing and professional activities...
Software applications become highly distributed and complex, involving independent collaborating com...
Web application security is the major security concern for e-business and information sharing commun...
Software systems become increasingly distributed, involving many independent and collaborating compo...
Software systems become increasingly distributed, involving many independent and collaborating compo...
We examine the intersection of data mining and se-mantic web in this paper. We briefly identify some...
The security characteristics of web service based systems depend on those of the individual web serv...
In this paper we address security of semantic Web services that are declaratively described in OWL-S...
Abstract. We state the benefits of transitioning from taxonomies to ontologies and ontology specific...
As the use of the internet for commercial purposes continues to grow, so do the number of security t...
11th International Conference on Metadata and Semantic Research, MTSR 2017 -- 28 November 2017 throu...
Security has preeminent importance in today's technological environment. In recent years, as cyber-a...