Search results for "Web application security"

showing 6 items of 6 documents

Review of web-based information security threats in smart grid

2017

The penetration of digital devices in Smart Grid has created a big security issue. OWASP is an online community of security professionals that identifies the most critical web application security risk in IT domain. Smart Grid also uses client-server based web-applications to collect and disseminate information. Therefore, Smart Grid network is analogous to IT network and similar kind of risk exists in the Smart Grid. This paper review the security risk in Smart Grid domain with reference to OWASP study. The Smart Grid security is more biased towards vulnerabilities associated with a machine to machine communication. Methodology to minimise the risk of attack is also discussed in this resea…

business.industryComputer scienceCross-site scriptingAccess controlInformation securityComputer securitycomputer.software_genreWeb application securityMachine to machineSmart gridWeb applicationbusinesscomputerDissemination2017 7th International Conference on Power Systems (ICPS)
researchProduct

Semantic Web Enabled Web Services: State-of-Art and Industrial Challenges

2003

Semantic Web technology has a vision to define and link Web data in a way that it can be understood and used by machines for automation, integration and reuse of data across various applications. Ontological definition of every resource as it is assumed in Semantic Web, along with new techniques for semantics processing and new vision Intelligent Web Services is expected to bring Web on its new level. At present, Web Services technology is stressed by the search of a right way for further development. Combination of Semantic Web and Web Services concepts may address many of difficulties of existing technology. It is not a question of whether Semantic Web is coming or not, but a question of …

Web standardsmedicine.medical_specialtyWeb 2.0Web developmentComputer scienceService discoveryWeb engineeringReusecomputer.software_genreSocial Semantic WebWorld Wide WebWeb designSemantic analyticsmedicineWeb navigationSemantic Web StackRDFSemantic WebData Webbusiness.industrycomputer.file_formatWeb application securityOntologyThe InternetWeb mappingWeb servicebusinessWeb intelligenceWS-PolicycomputerWeb modelingInformation integration
researchProduct

Web Services Specific Security Standards

2014

Abstract In this paper are described the aspects regarding the security within OGSA framework, introducing WS-Security standard – OASIS standard for Web Services security. There are approached the security aspects of the OGSA environment for the delivered architectures P2P – ‘Peer-to-Peer’ and there are presented the recent initiatives for creating a specific and adapted environment OGSA for the applications P2P and the specific security demands of these transactions. Furthermore, there are exposed aspects regarding the mobility of services and resources in the P2P context, with the conditions of applying WSRF framework, derived from OGSA to the P2P environments, SOA processes in P2P enviro…

Computer sciencebusiness.industryGeneral Engineeringmobile agents.Energy Engineering and Power TechnologyContext (language use)mobile environmentscomputer.software_genreWeb application securitySecurity softwareWorld Wide WebGrid architecturesWeb servicebusinesscomputersecurity softwareWeb servicesProcedia Economics and Finance
researchProduct

A Security Framework for Smart Ubiquitous Industrial Resources

2007

Conventional approaches to manage and control security seem to have reached their limits in new complex environments. These environments are open, dynamic, heterogeneous, distributed, self-managing, collaborative, international, nomadic, and ubiquitous. We are currently working on a middleware platform focused on the industrial needs, UBIWARE. UBIWARE integrates Ubiquitous Computing with Semantic Web, Distributed AI, Security and Privacy, and Enterprise Application Integration. In this paper, we describe our long-term vision for the security and privacy management in complex multi-agent systems like UBIWARE, SURPAS. The security infrastructure has to become pervasive, interoperable and inte…

Ubiquitous robotUbiquitous computingbusiness.industryComputer scienceInteroperabilityProvisioningWeb application securitycomputer.software_genreComputer securityWorld Wide WebMiddleware (distributed applications)Enterprise application integrationbusinessSemantic Webcomputer
researchProduct

Bot recognition in a Web store: An approach based on unsupervised learning

2020

Abstract Web traffic on e-business sites is increasingly dominated by artificial agents (Web bots) which pose a threat to the website security, privacy, and performance. To develop efficient bot detection methods and discover reliable e-customer behavioural patterns, the accurate separation of traffic generated by legitimate users and Web bots is necessary. This paper proposes a machine learning solution to the problem of bot and human session classification, with a specific application to e-commerce. The approach studied in this work explores the use of unsupervised learning (k-means and Graded Possibilistic c-Means), followed by supervised labelling of clusters, a generative learning stra…

Unsupervised classificationWeb bot detectionComputer Networks and CommunicationsComputer scienceInternet robot02 engineering and technologyMachine learningcomputer.software_genreWeb trafficWeb serverMachine learning0202 electrical engineering electronic engineering information engineeringArtificial neural networkbusiness.industrySupervised learning020206 networking & telecommunicationsPerceptronWeb application securityWeb botComputer Science ApplicationsSupport vector machineGenerative modelComputingMethodologies_PATTERNRECOGNITIONHardware and ArchitectureSupervised classificationUnsupervised learning020201 artificial intelligence & image processingArtificial intelligencebusinesscomputer
researchProduct

How Can Secure Websites Improve Buying Intention?

2014

A conceptual model is proposed to show 3 effects of augmenting security perceptions (more pleasure, less perceived risk and higher trust) in order to improve buying intention. The role of usability in reinforcing these direct and indirect security effects has also been tested. This study examines the reinforcement of previous relationships in highly usable contexts. To test this, a fictitious website was designed for a nonexistent clothing company directed at the segment of middle class consumers. Two blocks of changes were made to alter website usability: one concerning website speed and the other related to ease of use. Results for a study sample of 170 respondents show that in usable con…

business.industryStrategy and Managementmedia_common.quotation_subjectInternet privacyUsabilityE-commerceUSableWeb application securityComputer Science ApplicationsPleasureHuman-Computer InteractionRisk perceptionOrder (business)MarketingbusinessPsychologyWeb usabilitymedia_commonJournal of Organizational and End User Computing
researchProduct