Parts of digital business processes, composed of services, can be outsourced to third party organizations, which can be distributed all over the world. In an Internet of Services scenario, market places are used to mediate between service providers and consumers in order to bring to-gether partners for cross-organizational collaboration. Existing research on outsourced services in the context of the Internet of Services focuses on technical aspects, such as Web services, and does not take into account business-specific threats and corresponding attacks. In this paper, we present an attack taxonomy which can be used to structure both technological and business-oriented attacks on the Internet of Services and describe specific attack scenario...
Web Services are a promising solution to an age-old need: fast and flexible information sharing amon...
AbstractWeb Services allow applications to communicate with each other independent of platform and/o...
It is clearly evident as the Internet continues to grow that it has become a prominent and dependabl...
Parts of digital business processes, composed of services, can be outsourced to third party organiza...
The main objective of the different security services and mechanisms today are to provide privacy of...
The Internet of Services is envisioned as a global ServiceorientedArchitecture enabling collaboratio...
Abstract. This chapter studies not only how traditional threats may affect composite services, but a...
and control of information security risks have emerged as a primary mean by which organizations secu...
This study includes what the concept of IoT (Internet of Objects) expresses conceptually. It is stat...
Abstract. Network-based attacks pose a strong threat to the Internet landscape. There are different ...
Internet security attack could endanger the privacy of World Wide Web users and the integrity of the...
This report models the approach a focused attacker would take in order to breach an organization th...
Aim: The Internet of Things is a disruptive technology that converts physical objects into a constan...
International audienceWeb services allow the interoperability and communication of heterogeneous sys...
This chapter focuses on attack strategies that can be (and have been) used against financial IT infr...
Web Services are a promising solution to an age-old need: fast and flexible information sharing amon...
AbstractWeb Services allow applications to communicate with each other independent of platform and/o...
It is clearly evident as the Internet continues to grow that it has become a prominent and dependabl...
Parts of digital business processes, composed of services, can be outsourced to third party organiza...
The main objective of the different security services and mechanisms today are to provide privacy of...
The Internet of Services is envisioned as a global ServiceorientedArchitecture enabling collaboratio...
Abstract. This chapter studies not only how traditional threats may affect composite services, but a...
and control of information security risks have emerged as a primary mean by which organizations secu...
This study includes what the concept of IoT (Internet of Objects) expresses conceptually. It is stat...
Abstract. Network-based attacks pose a strong threat to the Internet landscape. There are different ...
Internet security attack could endanger the privacy of World Wide Web users and the integrity of the...
This report models the approach a focused attacker would take in order to breach an organization th...
Aim: The Internet of Things is a disruptive technology that converts physical objects into a constan...
International audienceWeb services allow the interoperability and communication of heterogeneous sys...
This chapter focuses on attack strategies that can be (and have been) used against financial IT infr...
Web Services are a promising solution to an age-old need: fast and flexible information sharing amon...
AbstractWeb Services allow applications to communicate with each other independent of platform and/o...
It is clearly evident as the Internet continues to grow that it has become a prominent and dependabl...