Journal articles on the topic 'Web service security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Web service security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Geuer-Pollmann, Christian, and Joris Claessens. "Web services and web service security standards." Information Security Technical Report 10, no. 1 (2005): 15–24. http://dx.doi.org/10.1016/j.istr.2004.11.001.
Full textRouached, Mohsen. "Web Service Composition Security." International Journal of Service Science, Management, Engineering, and Technology 12, no. 3 (2021): 154–74. http://dx.doi.org/10.4018/ijssmet.2021050109.
Full textRaepple, Martin. "Web service security netiquette." Datenschutz und Datensicherheit - DuD 31, no. 9 (2007): 648–51. http://dx.doi.org/10.1007/s11623-007-0216-8.
Full textSundar, Priya, R. Raju, P. Mahalakshmi, and G. Lalitha. "Providing security for Web Service Composition using Finite State Machine." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (2005): 435–44. http://dx.doi.org/10.24297/ijct.v4i2b1.3232.
Full textAniyikaiye, Jide, and Emmanuel Udoh. "Web Services Gateway." International Journal of Grid and High Performance Computing 8, no. 1 (2016): 85–92. http://dx.doi.org/10.4018/ijghpc.2016010108.
Full textIacono, Luigi Lo, and Jun Wang. "Web service layer security (WSLS)." Network Security 2008, no. 2 (2008): 10–13. http://dx.doi.org/10.1016/s1353-4858(08)70018-7.
Full textYue, Hua, and Xu Tao. "Web Services Security Problem in Service-oriented Architecture." Physics Procedia 24 (2012): 1635–41. http://dx.doi.org/10.1016/j.phpro.2012.02.241.
Full textHee, Kai-Cheong, and Chiung Ching Ho. "Design of Application Layer Services for Security Automation via a Web Service Approach." Journal of Advances in Computer Networks 2, no. 1 (2014): 76–84. http://dx.doi.org/10.7763/jacn.2014.v2.86.
Full textMartino, Lorenzo D., and Elisa Bertino. "Security for Web Services." International Journal of Web Services Research 6, no. 4 (2009): 48–74. http://dx.doi.org/10.4018/jwsr.2009071303.
Full textLiu, Yao Qin. "Research on Security Architecture Based on Web Service System." Applied Mechanics and Materials 687-691 (November 2014): 1716–19. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1716.
Full textKamatchi, R. "Collaborative Security Framework for Service Based Systems: Issues and Solutions." Asian Journal of Computer Science and Technology 3, no. 2 (2014): 40–46. http://dx.doi.org/10.51983/ajcst-2014.3.2.1737.
Full textRatnasingam, Pauline. "The Impact of Standards in Web Services Security." International Journal of Wireless Networks and Broadband Technologies 3, no. 2 (2014): 21–39. http://dx.doi.org/10.4018/ijwnbt.2014040102.
Full textShe, Wei, I.-Ling Yen, and Bhavani Thuraisingham. "Enhancing Security Modeling for Web Services Using Delegation and Pass-On." International Journal of Web Services Research 7, no. 1 (2010): 1–21. http://dx.doi.org/10.4018/jwsr.2010010101.
Full textGuo, Gui Li, and Chong Shan Ran. "The Research and Application of Web Service Bridge Technology in Remote Web Service Invocation Based on ASP.NET AJAX." Applied Mechanics and Materials 135-136 (October 2011): 1072–76. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.1072.
Full textMochammad Rizky Royani and Arief Wibowo. "Web Service Implementation in Logistics Company uses JSON Web Token and RC4 Cryptography Algorithm." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, no. 3 (2020): 591–600. http://dx.doi.org/10.29207/resti.v4i3.1952.
Full textIvanova, Malinka. "Security of Web Services: Methods and Contrivance." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 11 (2015): 6229–39. http://dx.doi.org/10.24297/ijct.v14i11.6374.
Full textZhang, Yong Sheng, Qin Luo, Xue Wu Nie, and Xiao Dong Bi. "Research on Policy-Based Service-Oriented Computing Security." Applied Mechanics and Materials 55-57 (May 2011): 602–7. http://dx.doi.org/10.4028/www.scientific.net/amm.55-57.602.
Full textZeng, Hao, Yong Wang Zhao, and Dian Fu Ma. "A Web Services Security Policy Description Model." Applied Mechanics and Materials 644-650 (September 2014): 2943–46. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2943.
Full textChoudhary, Pankaj, Rajendra Aaseri, and Nirmal Roberts. "HTTPI Based Web Service Security over SOAP." International Journal of Network Security & Its Applications 5, no. 3 (2013): 55–66. http://dx.doi.org/10.5121/ijnsa.2013.5306.
Full textLee, Seong-Hoon. "A Security Enhancement Method for Web Service." Journal of Digital Policy and Management 11, no. 12 (2013): 361–66. http://dx.doi.org/10.14400/jdpm.2013.11.12.361.
Full textSrirama, Satish Narayana, Matthias Jarke, and Wolfgang Prinz. "Security analysis of mobile web service provisioning." International Journal of Internet Technology and Secured Transactions 1, no. 1/2 (2007): 151. http://dx.doi.org/10.1504/ijitst.2007.014839.
Full textKornienko, D. V., S. V. Mishina, and M. O. Melnikov. "The Single Page Application architecture when developing secure Web services." Journal of Physics: Conference Series 2091, no. 1 (2021): 012065. http://dx.doi.org/10.1088/1742-6596/2091/1/012065.
Full textSun, Po-Ling, and Cheng-Yuan Ku. "Review of threats on trust and reputation models." Industrial Management & Data Systems 114, no. 3 (2014): 472–83. http://dx.doi.org/10.1108/imds-11-2013-0470.
Full textLee, Seong-Hoon. "A Study on Web Service Analysis and Bio-information based Web Service Security Mechanism." International Journal of Security and Its Applications 8, no. 2 (2014): 77–86. http://dx.doi.org/10.14257/ijsia.2014.8.2.08.
Full textAliti, Admirim, Edmond Jajaga, and Kozeta Sevrani. "A need for an integrative security model for semantic stream reasoning systems." International Journal of Business & Technology 6, no. 3 (2018): 1–4. http://dx.doi.org/10.33107/ijbte.2018.6.3.01.
Full textSopran, Cepi, Ambar Lukitaningsih, and Nonik Kusuma Ningrum. "PENGARUH WEBSITE DESIGN, CUSTOMER SERVICE, SECURITY PRIVACY TERHADAP OVERALL E-SERVICE QUALITY (Studi Kasus Pada Pengguna Shopee Yogyakarta)." JBE (Jurnal Bingkai Ekonomi) 7, no. 1 (2021): 42–55. http://dx.doi.org/10.54066/jbe.v7i1.120.
Full textAbidi, Sarra, Mehrez Essafi, Chirine Ghedira Guegan, Myriam Fakhri, Hamad Witti, and Henda Hjjami Ben Ghezala. "A Web Service Security Governance Approach Based on Dedicated Micro-services." Procedia Computer Science 159 (2019): 372–86. http://dx.doi.org/10.1016/j.procs.2019.09.192.
Full textKumaran, N., Purandhar Sri Sai, and Lokesh Manikanta. "Web Phishing Detection using Machine Learning." International Journal of Innovative Technology and Exploring Engineering 11, no. 4 (2022): 56–59. http://dx.doi.org/10.35940/ijitee.c9804.0311422.
Full textAlsobeh, Anas M. R., Aws Abed Al Raheem Magableh, and Emad M. AlSukhni. "Runtime Reusable Weaving Model for Cloud Services Using Aspect-Oriented Programming." International Journal of Web Services Research 15, no. 1 (2018): 71–88. http://dx.doi.org/10.4018/ijwsr.2018010104.
Full textLiao, Ziqi, and Xinping Shi. "Web functionality, web content, information security, and online tourism service continuance." Journal of Retailing and Consumer Services 39 (November 2017): 258–63. http://dx.doi.org/10.1016/j.jretconser.2017.06.003.
Full textFragkou, Pavlina. "The Greek Interoperability Center." JeDEM - eJournal of eDemocracy and Open Government 10, no. 1 (2018): 82–93. http://dx.doi.org/10.29379/jedem.v10i1.497.
Full textKewate, Neha. "A Review on AWS - Cloud Computing Technology." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (2022): 258–63. http://dx.doi.org/10.22214/ijraset.2022.39802.
Full textAbdelatey, Amira, Mohamed Elkawkagy, Ashraf Elsisi, and Arabi Keshk. "Extend Web Service Security Negotiation Framework in Privacy." International Journal of Information Technology and Computer Science 9, no. 8 (2017): 30–39. http://dx.doi.org/10.5815/ijitcs.2017.08.04.
Full textGordon, Andrew D., and Riccardo Pucella. "Validating a web service security abstraction by typing." Formal Aspects of Computing 17, no. 3 (2005): 277–318. http://dx.doi.org/10.1007/s00165-004-0058-1.
Full textDeLooze, Lori. "Providing Web Service Security in a Federated Environment." IEEE Security and Privacy Magazine 5, no. 1 (2007): 73–75. http://dx.doi.org/10.1109/msp.2007.16.
Full textAlMahmoud, Abdelrahman, Maurizio Colombo, Chan Yeob Yeun, and Hassan Al-Muhairi. "Enhancement of Key Derivation in Web Service Security." Wireless Personal Communications 97, no. 4 (2017): 5171–84. http://dx.doi.org/10.1007/s11277-017-4773-3.
Full textFehlmann, Tobias, Fabian Kern, Pascal Hirsch, Robin Steinhaus, Dominik Seelow, and Andreas Keller. "Aviator: a web service for monitoring the availability of web services." Nucleic Acids Research 49, W1 (2021): W46—W51. http://dx.doi.org/10.1093/nar/gkab396.
Full textSusanto, Budi. "PEMBENAHAN WEB PROFIL SINODE GEREJA KRISTEN JAWA." SHARE "SHaring - Action - REflection" 6, no. 2 (2020): 93–98. http://dx.doi.org/10.9744/share.6.2.93-98.
Full textMeily, Meily. "XYZ Web App Information Security Management Risk Assessment." ACMIT Proceedings 1, no. 1 (2014): 59–89. http://dx.doi.org/10.33555/acmit.v1i1.19.
Full textWei, Yong He, Yong Ping Hao, and Yang Wang. "An Access Control Model for Workflow in Service Oriented Environment." Applied Mechanics and Materials 16-19 (October 2009): 288–92. http://dx.doi.org/10.4028/www.scientific.net/amm.16-19.288.
Full textSethi, IPS, Sanjay Kumar Sinha, Neeta Chauhan, and Deepti Khanduja. "Secure Web Application: Rudimentary perspective." Journal of Engineering Education Transformations 36, S1 (2022): 185–90. http://dx.doi.org/10.16920/jeet/2022/v36is1/22190.
Full textWen, Xiao Sen. "Research on Intrusion Detection Method of Web Service Composition." Applied Mechanics and Materials 539 (July 2014): 331–35. http://dx.doi.org/10.4028/www.scientific.net/amm.539.331.
Full textRaj, Gaurav, Manish Mahajan, and Dheerendra Singh. "Trust Decision Model and Trust Evaluation Model for Quality Web Service Identification in Web Service Lifecycle Using QSW Data Analysis." International Journal of Web-Based Learning and Teaching Technologies 15, no. 1 (2020): 53–72. http://dx.doi.org/10.4018/ijwltt.2020010103.
Full textHu, An Ming. "The Research of WSE-Based on Web Services Security." Applied Mechanics and Materials 416-417 (September 2013): 1458–60. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1458.
Full textDeeptha, Ramamurthi, and Rajeswari Mukesh. "Single Sign-on Mechanism for Secure Web Service Access through ISSO." Journal of Communications Software and Systems 11, no. 1 (2015): 8. http://dx.doi.org/10.24138/jcomss.v11i1.112.
Full textLiu, Ya, Jian Hua Mao, and Xue Feng Liu. "Smart Community Security System Based on Sensor Web." Applied Mechanics and Materials 571-572 (June 2014): 1037–41. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.1037.
Full textAbdillah, Leon A., and Boby Febriansah. "Web-based Computerized Land Activities Analysis." Journal of Information Systems and Informatics 2, no. 1 (2020): 178–91. http://dx.doi.org/10.33557/journalisi.v2i1.60.
Full textSiregar, Junita Juwita. "Analisis Explotasi Keamanan Web Denial of Service Attack." ComTech: Computer, Mathematics and Engineering Applications 4, no. 2 (2013): 1199. http://dx.doi.org/10.21512/comtech.v4i2.2597.
Full textXu, Hong. "Extended Web Services Model Design for Non-Functional Requirements." Applied Mechanics and Materials 63-64 (June 2011): 855–58. http://dx.doi.org/10.4028/www.scientific.net/amm.63-64.855.
Full textSanjana, A., M. Anusha, G. Pravallika, and Mrs S. Radhika. "REST APIs Cloud Service Security Checks." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (2022): 289–92. http://dx.doi.org/10.22214/ijraset.2022.45147.
Full text