The goal of this thesis is to study the security requirements of service discovery protocols and to provide secure and reliable solutions to overcome threats and security lacks associated to service discovery standards. Three security solutions are proposed that address different deployments of service discovery. Architectures suitable for secure discovery and the protocols they require are introduced in the first part of this thesis. Decentralized architectures are addressed using an attribute based encryption scheme to restrict the access to discovery messages. An alternative proposal is presented for centralized architectures that makes use of a trusted registry in charge of enforcing discovery policies. Finally, a hybrid model is presen...
Web services allow the communication of heterogeneous systems on the Web. These facilities make them...
Today, the Internet of Things (IoT) applications can significantly improve the daily life of users. ...
This work addresses the existing research gap regarding the security of service oriented architectur...
Service Oriented Architectures (SOA) introduce a loosely coupled interaction model which requires di...
The widespread deployment of inexpensive communications technology, computational resources in the n...
The widespread usage of computing devices is eroding the individual's right to privacy. Pervasive co...
To cope with the challenges posed by device capacity and capability, and also the nature of ad hoc n...
This paper presents an architecture for secure service discovery for use in home networks. We give a...
Service discovery and secure and safe service usage are essential elements in the deployment of home...
While there is considerable experience with addressing the needs for security and fault-tolerance i...
Abstract — JXTA is a P2P (Peer-to-Peer) Semantic Web application, which is aimed to accommodate hete...
Changes in economic environment impose new organizational strategies to companies: refocusing busine...
Les services Web (SW) sont considérés comme étant un bloc pilier pour la réalisation de transactions...
Cryptography has been a key factor in enabling services and products trading over the Internet. Clou...
Modern organisations rely intensively on information and communicationtechnology infrastructures. Su...
Web services allow the communication of heterogeneous systems on the Web. These facilities make them...
Today, the Internet of Things (IoT) applications can significantly improve the daily life of users. ...
This work addresses the existing research gap regarding the security of service oriented architectur...
Service Oriented Architectures (SOA) introduce a loosely coupled interaction model which requires di...
The widespread deployment of inexpensive communications technology, computational resources in the n...
The widespread usage of computing devices is eroding the individual's right to privacy. Pervasive co...
To cope with the challenges posed by device capacity and capability, and also the nature of ad hoc n...
This paper presents an architecture for secure service discovery for use in home networks. We give a...
Service discovery and secure and safe service usage are essential elements in the deployment of home...
While there is considerable experience with addressing the needs for security and fault-tolerance i...
Abstract — JXTA is a P2P (Peer-to-Peer) Semantic Web application, which is aimed to accommodate hete...
Changes in economic environment impose new organizational strategies to companies: refocusing busine...
Les services Web (SW) sont considérés comme étant un bloc pilier pour la réalisation de transactions...
Cryptography has been a key factor in enabling services and products trading over the Internet. Clou...
Modern organisations rely intensively on information and communicationtechnology infrastructures. Su...
Web services allow the communication of heterogeneous systems on the Web. These facilities make them...
Today, the Internet of Things (IoT) applications can significantly improve the daily life of users. ...
This work addresses the existing research gap regarding the security of service oriented architectur...