Abstract. This chapter studies not only how traditional threats may affect composite services, but also some of the new challenges that arise from the emerging Future Internet. For instance, while atomic services may, in isolation, comply with privacy requirements, a composition of the same services could lead to violations due to the combined informa-tion they manipulate. Furthermore, with volatile services and evolving laws and regulations, a composite service that seemed secure enough at deployment time, may find itself unacceptably compromised some time later. Our main contributions are a taxonomy of threats for compos-ite services in the Future Internet, which organises thirty-two threats within seven categories, and a corresponding ta...
International audienceDependability is an important characteristic that a trustworthy computer syste...
This paper discusses the emerging and future cyber threats to critical systems identifed during the ...
Security in information and communication technology currently relies on a collection of mostly un-r...
Abstract—Web services are modular, self describing software components that can be invoked over a di...
Abstract. Composite services foster reuse and efficiency in providing consumers with different funct...
One of the hottest trends today within distributed computing is Web Services. Basically, a Web Servi...
Web Services are a promising solution to an age-old need: fast and flexible information sharing amon...
The promising features of Web services also make them vulnerable to new types of security threats. W...
Development which led to the creation of information society also resulted in the appearance of new ...
Electronic commerce and Internet have enabled businesses to reduce costs, attain greater market reac...
Parts of digital business processes, composed of services, can be outsourced to third party organiza...
Abstract. With the rapid adoption of the Service Oriented Architecture (SOA), sophisticated software...
The recent decades have witnessed dramatic developments in information and communication technologie...
One of the most critical problems on today’s Internet is the lack of security. This gives rise to ap...
This paper describes the basic principles of designing and administering a relatively secure network...
International audienceDependability is an important characteristic that a trustworthy computer syste...
This paper discusses the emerging and future cyber threats to critical systems identifed during the ...
Security in information and communication technology currently relies on a collection of mostly un-r...
Abstract—Web services are modular, self describing software components that can be invoked over a di...
Abstract. Composite services foster reuse and efficiency in providing consumers with different funct...
One of the hottest trends today within distributed computing is Web Services. Basically, a Web Servi...
Web Services are a promising solution to an age-old need: fast and flexible information sharing amon...
The promising features of Web services also make them vulnerable to new types of security threats. W...
Development which led to the creation of information society also resulted in the appearance of new ...
Electronic commerce and Internet have enabled businesses to reduce costs, attain greater market reac...
Parts of digital business processes, composed of services, can be outsourced to third party organiza...
Abstract. With the rapid adoption of the Service Oriented Architecture (SOA), sophisticated software...
The recent decades have witnessed dramatic developments in information and communication technologie...
One of the most critical problems on today’s Internet is the lack of security. This gives rise to ap...
This paper describes the basic principles of designing and administering a relatively secure network...
International audienceDependability is an important characteristic that a trustworthy computer syste...
This paper discusses the emerging and future cyber threats to critical systems identifed during the ...
Security in information and communication technology currently relies on a collection of mostly un-r...