Academic literature on the topic 'Web services. Computer network architectures. Electronic data processing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Web services. Computer network architectures. Electronic data processing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Web services. Computer network architectures. Electronic data processing"

1

Budiyanto, Setiyo, Freddy Artadima Silaban, Lukman Medriavin Silalahi, Selamet Kurniawan, Fajar Rahayu I. M., Ucuk Darusalam, and Septi Andryana. "Design and monitoring body temperature and heart rate in humans based on WSN using star topology." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (April 1, 2021): 326. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp326-334.

Full text
Abstract:
<span><span>Electronic health (E-health) uses information and communication technology including electronics, telecommunications, computers, and informatics to process various types of medical information, to carry out clinical services (diagnosis or therapy). Health is the most important asset in human life, therefore maintaining health is a top priority and serious attention needed. Heart rate and body temperature are vital signs that the hospital routinely checks for clinical signs and are useful for strengthening the diagnosis of a disease. In this research monitoring heart rate and body temperature with the wireless sensor network (WSN) method that uses <span>NodeMCU 1.0 as a controller module and wireless as communication between nodes, the wireless network used in this research Wi-Fi network. As a data taker, a DS18b20 temperature sensor and a heart rate sensor (pulse sensor) are needed, which will be displayed by the ThingSpeak web and smartphones. From the test results, the success rate of the system in detecting heart rates is 97.17%. Whereas in detecting body temperature the success rate of the system is 99.28%. For data transmission, the system can send data smoothly at a maximum distance of 15 meters with a barrier.</span></span></span>
APA, Harvard, Vancouver, ISO, and other styles
2

Sun, Qitong, Jun Han, and Dianfu Ma. "A Framework for Service Semantic Description Based on Knowledge Graph." Electronics 10, no. 9 (April 24, 2021): 1017. http://dx.doi.org/10.3390/electronics10091017.

Full text
Abstract:
To construct a large-scale service knowledge graph is necessary. We propose a method, namely semantic information extension, for service knowledge graphs. We insist on the information of services described by Web Services Description Language (WSDL) and we design the ontology layer of web service knowledge graph and construct the service graph, and using the WSDL document data set, the generated service knowledge graph contains 3738 service entities. In particular, our method can give a full performance to its effect in service discovery. To evaluate our approach, we conducted two sets of experiments to explore the relationship between services and classify services that develop by service descriptions. We constructed two experimental data sets, then designed and trained two different deep neural networks for the two tasks to extract the semantics of the natural language used in the service discovery task. In the prediction task of exploring the relationship between services, the prediction accuracy rate reached 95.1%, and in the service classification experiment, the accuracy rate of TOP5 reached 60.8%. Our experience shows that the service knowledge graph has additional advantages over traditional file storage when managing additional semantic information is effective and the new service representation method is helpful for service discovery and composition tasks.
APA, Harvard, Vancouver, ISO, and other styles
3

Xu, Guang Yin, Yan Na Zhang, and Jian Hua Qu. "The Design of Information Platform Structure Used in Expressway Management Based on SOA Frame." Advanced Materials Research 403-408 (November 2011): 2997–3003. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.2997.

Full text
Abstract:
On the basis of the study on the expressway management business flow as well as the SOA architecture concept, this paper designs the overall framework for a systematical expressway management information platform, which includes network of 3 levels, grading processing, comprehensive monitoring, comprehensive information application management, web portal and security system, and then designs the overall technical frame of this platform. Road administration is the core part of highway administration and the concentrated reflection of external highway administrative management. In addition to the approval of highway property, construction, maintenance and management, its main contents also involve the highway maintenance, highway entrance fee management and other road maintenance. It covers a wide range and there is so much information of deferent types to be processed and used. Although domestic and foreign roads and road administration departments have some information management systems in use, some are special highway road administration information systems[1,2], and some are highway comprehensive information management systems[3], the integrated comprehensive highway information management contents are lack of research, and the professional, comprehensive, open road administration information platform has not been established yet. Therefore, the author conducted the design of constructing advanced road administration information platform structure. This platform uses the service oriented architecture (SOA), integrates advanced information network technology, data communications monitoring and transmission technology, electronic control technology, computer processing technique with 3S, PDA and other advanced technologies, so that it is effectively integrated and used in the highway information management. The construction of the platform will realize the effective and scientific management for highways business, ensuring that the highways are unblocked, and maintaining the road property and rights of highways, thus promoting the development of the industrial management information.
APA, Harvard, Vancouver, ISO, and other styles
4

Alaa, Rana, Mariam Gawish, and Manuel Fernández-Veiga. "Improving Recommendations for Online Retail Markets Based on Ontology Evolution." Electronics 10, no. 14 (July 11, 2021): 1650. http://dx.doi.org/10.3390/electronics10141650.

Full text
Abstract:
The semantic web is considered to be an extension of the present web. In the semantic web, information is given with well-defined meanings, and thus helps people worldwide to cooperate together and exchange knowledge. The semantic web plays a significant role in describing the contents and services in a machine-readable form. It has been developed based on ontologies, which are deemed the backbone of the semantic web. Ontologies are a key technique with which semantics are annotated, and they provide common comprehensible foundation for resources on the semantic web. The use of semantics and artificial intelligence leads to what is known to be “Smarter Web”, where it will be easy to retrieve what customers want to see on e-commerce platforms, and thus will help users save time and enhance their search for the products they need. The semantic web is used as well as webs 3.0, which helps enhancing systems performance. Previous personalized recommendation methods based on ontologies identify users’ preferences by means of static snapshots of purchase data. However, as the user preferences evolve with time, the one-shot ontology construction is too constrained for capturing individual diverse opinions and users’ preferences evolution over time. This paper will present a novel recommendation system architecture based on ontology evolution, the proposed subsystem architecture for ontology evolution. Furthermore, the paper proposes an ontology building methodology based on a semi-automatic technique as well as development of online retail ontology. Additionally, a recommendation method based on the ontology reasoning is proposed. Based on the proposed method, e-retailers can develop a more convenient product recommendation system to support consumers’ purchase decisions.
APA, Harvard, Vancouver, ISO, and other styles
5

Dankwa, Stephen, and Lu Yang. "Securing IoT Devices: A Robust and Efficient Deep Learning with a Mixed Batch Adversarial Generation Process for CAPTCHA Security Verification." Electronics 10, no. 15 (July 27, 2021): 1798. http://dx.doi.org/10.3390/electronics10151798.

Full text
Abstract:
The Internet of Things environment (e.g., smart phones, smart televisions, and smart watches) ensures that the end user experience is easy, by connecting lives on web services via the internet. Integrating Internet of Things devices poses ethical risks related to data security, privacy, reliability and management, data mining, and knowledge exchange. An adversarial machine learning attack is a good practice to adopt, to strengthen the security of text-based CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart), to withstand against malicious attacks from computer hackers, to protect Internet of Things devices and the end user’s privacy. The goal of this current study is to perform security vulnerability verification on adversarial text-based CAPTCHA, based on attacker–defender scenarios. Therefore, this study proposed computation-efficient deep learning with a mixed batch adversarial generation process model, which attempted to break the transferability attack, and mitigate the problem of catastrophic forgetting in the context of adversarial attack defense. After performing K-fold cross-validation, experimental results showed that the proposed defense model achieved mean accuracies in the range of 82–84% among three gradient-based adversarial attack datasets.
APA, Harvard, Vancouver, ISO, and other styles
6

De Fazio, Roberto, Massimo De Vittorio, and Paolo Visconti. "Innovative IoT Solutions and Wearable Sensing Systems for Monitoring Human Biophysical Parameters: A Review." Electronics 10, no. 14 (July 12, 2021): 1660. http://dx.doi.org/10.3390/electronics10141660.

Full text
Abstract:
Digital and information technologies are heavily pervading several aspects of human activities, improving our life quality. Health systems are undergoing a real technological revolution, radically changing how medical services are provided, thanks to the wide employment of the Internet of Things (IoT) platforms supporting advanced monitoring services and intelligent inferring systems. This paper reports, at first, a comprehensive overview of innovative sensing systems for monitoring biophysical and psychophysical parameters, all suitable for integration with wearable or portable accessories. Wearable devices represent a headstone on which the IoT-based healthcare platforms are based, providing capillary and real-time monitoring of patient’s conditions. Besides, a survey of modern architectures and supported services by IoT platforms for health monitoring is presented, providing useful insights for developing future healthcare systems. All considered architectures employ wearable devices to gather patient parameters and share them with a cloud platform where they are processed to provide real-time feedback. The reported discussion highlights the structural differences between the discussed frameworks, from the point of view of network configuration, data management strategy, feedback modality, etc.
APA, Harvard, Vancouver, ISO, and other styles
7

Koloveas, Paris, Thanasis Chantzios, Sofia Alevizopoulou, Spiros Skiadopoulos , and Christos Tryfonopoulos . "inTIME: A Machine Learning-Based Framework for Gathering and Leveraging Web Data to Cyber-Threat Intelligence." Electronics 10, no. 7 (March 30, 2021): 818. http://dx.doi.org/10.3390/electronics10070818.

Full text
Abstract:
In today’s world, technology has become deep-rooted and more accessible than ever over a plethora of different devices and platforms, ranging from company servers and commodity PCs to mobile phones and wearables, interconnecting a wide range of stakeholders such as households, organizations and critical infrastructures. The sheer volume and variety of the different operating systems, the device particularities, the various usage domains and the accessibility-ready nature of the platforms creates a vast and complex threat landscape that is difficult to contain. Staying on top of these evolving cyber-threats has become an increasingly difficult task that presently relies heavily on collecting and utilising cyber-threat intelligence before an attack (or at least shortly after, to minimize the damage) and entails the collection, analysis, leveraging and sharing of huge volumes of data. In this work, we put forward inTIME, a machine learning-based integrated framework that provides an holistic view in the cyber-threat intelligence process and allows security analysts to easily identify, collect, analyse, extract, integrate, and share cyber-threat intelligence from a wide variety of online sources including clear/deep/dark web sites, forums and marketplaces, popular social networks, trusted structured sources (e.g., known security databases), or other datastore types (e.g., pastebins). inTIME is a zero-administration, open-source, integrated framework that enables security analysts and security stakeholders to (i) easily deploy a wide variety of data acquisition services (such as focused web crawlers, site scrapers, domain downloaders, social media monitors), (ii) automatically rank the collected content according to its potential to contain useful intelligence, (iii) identify and extract cyber-threat intelligence and security artifacts via automated natural language understanding processes, (iv) leverage the identified intelligence to actionable items by semi-automatic entity disambiguation, linkage and correlation, and (v) manage, share or collaborate on the stored intelligence via open standards and intuitive tools. To the best of our knowledge, this is the first solution in the literature to provide an end-to-end cyber-threat intelligence management platform that is able to support the complete threat lifecycle via an integrated, simple-to-use, yet extensible framework.
APA, Harvard, Vancouver, ISO, and other styles
8

Aghenta, Lawrence Oriaghe, and Mohammad Tariq Iqbal. "Low-Cost, Open Source IoT-Based SCADA System Design Using Thinger.IO and ESP32 Thing." Electronics 8, no. 8 (July 24, 2019): 822. http://dx.doi.org/10.3390/electronics8080822.

Full text
Abstract:
Supervisory Control and Data Acquisition (SCADA) is a technology for monitoring and controlling distributed processes. SCADA provides real-time data exchange between a control/monitoring centre and field devices connected to the distributed processes. A SCADA system performs these functions using its four basic elements: Field Instrumentation Devices (FIDs) such as sensors and actuators which are connected to the distributed process plants being managed, Remote Terminal Units (RTUs) such as single board computers for receiving, processing and sending the remote data from the field instrumentation devices, Master Terminal Units (MTUs) for handling data processing and human machine interactions, and lastly SCADA Communication Channels for connecting the RTUs to the MTUs, and for parsing the acquired data. Generally, there are two classes of SCADA hardware and software; Proprietary (Commercial) and Open Source. In this paper, we present the design and implementation of a low-cost, Open Source SCADA system by using Thinger.IO local server IoT platform as the MTU and ESP32 Thing micro-controller as the RTU. SCADA architectures have evolved over the years from monolithic (stand-alone) through distributed and networked architectures to the latest Internet of Things (IoT) architecture. The SCADA system proposed in this work is based on the Internet of Things SCADA architecture which incorporates web services with the conventional (traditional) SCADA for a more robust supervisory control and monitoring. It comprises of analog Current and Voltage Sensors, the low-power ESP32 Thing micro-controller, a Raspberry Pi micro-controller, and a local Wi-Fi Router. In its implementation, the current and voltage sensors acquire the desired data from the process plant, the ESP32 micro-controller receives, processes and sends the acquired sensor data via a Wi-Fi network to the Thinger.IO local server IoT platform for data storage, real-time monitoring and remote control. The Thinger.IO server is locally hosted by the Raspberry Pi micro-controller, while the Wi-Fi network which forms the SCADA communication channel is created using the Wi-Fi Router. In order to test the proposed SCADA system solution, the designed hardware was set up to remotely monitor the Photovoltaic (PV) voltage, current, and power, as well as the storage battery voltage of a 260 W, 12 V Solar PV System. Some of the created Human Machine Interfaces (HMIs) on Thinger.IO Server where an operator can remotely monitor the data in the cloud, as well as initiate supervisory control activities if the acquired data are not in the expected range, using both a computer connected to the network, and Thinger.IO Mobile Apps are presented in the paper.
APA, Harvard, Vancouver, ISO, and other styles
9

Annapragada, Akshaya V., Marcella M. Donaruma-Kwoh, Ananth V. Annapragada, and Zbigniew A. Starosolski. "A natural language processing and deep learning approach to identify child abuse from pediatric electronic medical records." PLOS ONE 16, no. 2 (February 26, 2021): e0247404. http://dx.doi.org/10.1371/journal.pone.0247404.

Full text
Abstract:
Child physical abuse is a leading cause of traumatic injury and death in children. In 2017, child abuse was responsible for 1688 fatalities in the United States, of 3.5 million children referred to Child Protection Services and 674,000 substantiated victims. While large referral hospitals maintain teams trained in Child Abuse Pediatrics, smaller community hospitals often do not have such dedicated resources to evaluate patients for potential abuse. Moreover, identification of abuse has a low margin of error, as false positive identifications lead to unwarranted separations, while false negatives allow dangerous situations to continue. This context makes the consistent detection of and response to abuse difficult, particularly given subtle signs in young, non-verbal patients. Here, we describe the development of artificial intelligence algorithms that use unstructured free-text in the electronic medical record—including notes from physicians, nurses, and social workers—to identify children who are suspected victims of physical abuse. Importantly, only the notes from time of first encounter (e.g.: birth, routine visit, sickness) to the last record before child protection team involvement were used. This allowed us to develop an algorithm using only information available prior to referral to the specialized child protection team. The study was performed in a multi-center referral pediatric hospital on patients screened for abuse within five different locations between 2015 and 2019. Of 1123 patients, 867 records were available after data cleaning and processing, and 55% were abuse-positive as determined by a multi-disciplinary team of clinical professionals. These electronic medical records were encoded with three natural language processing (NLP) algorithms—Bag of Words (BOW), Word Embeddings (WE), and Rules-Based (RB)—and used to train multiple neural network architectures. The BOW and WE encodings utilize the full free-text, while RB selects crucial phrases as identified by physicians. The best architecture was selected by average classification accuracy for the best performing model from each train-test split of a cross-validation experiment. Natural language processing coupled with neural networks detected cases of likely child abuse using only information available to clinicians prior to child protection team referral with average accuracy of 0.90±0.02 and average area under the receiver operator characteristic curve (ROC-AUC) 0.93±0.02 for the best performing Bag of Words models. The best performing rules-based models achieved average accuracy of 0.77±0.04 and average ROC-AUC 0.81±0.05, while a Word Embeddings strategy was severely limited by lack of representative embeddings. Importantly, the best performing model had a false positive rate of 8%, as compared to rates of 20% or higher in previously reported studies. This artificial intelligence approach can help screen patients for whom an abuse concern exists and streamline the identification of patients who may benefit from referral to a child protection team. Furthermore, this approach could be applied to develop computer-aided-diagnosis platforms for the challenging and often intractable problem of reliably identifying pediatric patients suffering from physical abuse.
APA, Harvard, Vancouver, ISO, and other styles
10

Le-Tuan, Anh, Conor Hayes, Manfred Hauswirth, and Danh Le-Phuoc. "Pushing the Scalability of RDF Engines on IoT Edge Devices." Sensors 20, no. 10 (May 14, 2020): 2788. http://dx.doi.org/10.3390/s20102788.

Full text
Abstract:
Semantic interoperability for the Internet of Things (IoT) is enabled by standards and technologies from the Semantic Web. As recent research suggests a move towards decentralised IoT architectures, we have investigated the scalability and robustness of RDF (Resource Description Framework)engines that can be embedded throughout the architecture, in particular at edge nodes. RDF processing at the edge facilitates the deployment of semantic integration gateways closer to low-level devices. Our focus is on how to enable scalable and robust RDF engines that can operate on lightweight devices. In this paper, we have first carried out an empirical study of the scalability and behaviour of solutions for RDF data management on standard computing hardware that have been ported to run on lightweight devices at the network edge. The findings of our study shows that these RDF store solutions have several shortcomings on commodity ARM (Advanced RISC Machine) boards that are representative of IoT edge node hardware. Consequently, this has inspired us to introduce a lightweight RDF engine, which comprises an RDF storage and a SPARQL processor for lightweight edge devices, called RDF4Led. RDF4Led follows the RISC-style (Reduce Instruction Set Computer) design philosophy. The design constitutes a flash-aware storage structure, an indexing scheme, an alternative buffer management technique and a low-memory-footprint join algorithm that demonstrates improved scalability and robustness over competing solutions. With a significantly smaller memory footprint, we show that RDF4Led can handle 2 to 5 times more data than popular RDF engines such as Jena TDB (Tuple Database) and RDF4J, while consuming the same amount of memory. In particular, RDF4Led requires 10%–30% memory of its competitors to operate on datasets of up to 50 million triples. On memory-constrained ARM boards, it can perform faster updates and can scale better than Jena TDB and Virtuoso. Furthermore, we demonstrate considerably faster query operations than Jena TDB and RDF4J.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Web services. Computer network architectures. Electronic data processing"

1

Fornasier, Patric Computer Science &amp Engineering Faculty of Engineering UNSW. "An empirical investigation of SSDL." 2007. http://handle.unsw.edu.au/1959.4/40514.

Full text
Abstract:
The SOAP Service Description Language (SSDL) is a SOAP-centric language for describing Web Service contracts. SSDL focuses on message abstraction as the building block for creating service-oriented applications and provides an extensible range of protocol frameworks that can be used to describe and formally model Web Service interactions. SSDL's natural alignment with service-oriented design principles intuitively suggests that it encourages the creation of applications that adhere to this architectural paradigm. Given the lack of tools and empirical data for using SSDL as part of Web Services-based SOAs, we identified the need to investigate its practicability and usefulness through empirical work. To that end we have developed Soya, a programming model and runtime environment for creating and executing SSDL-based Web Services. On the one hand, Soya provides straightforward programming abstractions that foster message-oriented thinking. On the other hand, it leverages contemporary tooling (i.e. Windows Communication Foundation) with SSDL-related runtime functionality and semantics. In this thesis, we describe the design and architecture of Soya and show how it makes it possible to use SSDL as an alternative and powerful metadata language without imposing unrealistic burdens on application developers. In addition, we use Soya and SSDL in a case study which provides a set of initial empirical results with respect to SSDL's strengths and drawbacks. In summary, our work serves as a knowledge framework for better understanding message-oriented Web Service development and demonstrates SSDL's practicability in terms of implementation and usability.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Web services. Computer network architectures. Electronic data processing"

1

IEEE International Conference on Service-Oriented Computing and Applications (2007 Newport Beach, Calif.). IEEE International Conference on Service-Oriented Computing and Applications: SOCA 2007 : proceedings : 19-20 June, 2007, Newport Beach, California, USA. Los Alamitos, CA: IEEE Computer Society, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1947-, Krämer Bernd, Lin Kwei-Jay 1955-, and Narasimhan Priya, eds. Service-oriented computing - ICSOC 2007: Fifth international conference, Vienna, Austria, September 17-20, 2007 ; proceedings. Berlin: Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Service-oriented computing--ICSOC 2007 workshops: ICSOC 2007, international workshops, Vienna, Austria, September 17, 2007 : revised selected papers. Berlin: Springer, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

ICSOC 2006 (2006 Chicago, Ill.). Service-oriented computing: ICSOC 2006 : 4th international conference, Chicago, IL, USA, December 4-7, 2006 : proceedings. Berlin: Springer, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dimitrios, Georgakopoulos, and International Workshop on Modeling Service-oriented Architectures: Business Perspective and Model Mapping (1st : 2006 : Chicago, Ill.), eds. Service-oriented computing: ICSOC 2006 : 4th international conference, Chicago, IL, USA, December 4-7, 2006 : workshops proceedings. Berlin: Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Maximilien, E. Michael. Service-Oriented Computing: ICSOC 2010 International Workshops, PAASC, WESOA, SEE, and SOC-LOG, San Francisco, CA, USA, December 7-10, 2010, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

ICSOC 2010 (2010 San Francisco, Calif.). Service-oriented computing: 8th international conference, ICSOC 2010, San Francisco, CA, USA, December 7-10, 2010 : proceedings. Berlin: Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

1963-, Murthy V. K., ed. Architectural issues of Web-enabled electronic business. Hershey PA: Idea Group Pub., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Schellhase, Jörg. Recherche wissenschaftlicher Publikationen. Köln: EUL, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

SOA modeling patterns for service-oriented discovery and analysis. Hoboken, N.J: John Wiley & Sons, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Web services. Computer network architectures. Electronic data processing"

1

Al-Hamdani, Wasim A. "E-Mail, Web Service and Cryptography." In Applied Cryptography for Cyber Security and Defense, 52–78. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-783-1.ch003.

Full text
Abstract:
Cryptography is the study and practice of protecting information and has been used since ancient times in many different shapes and forms to protect messages from being intercepted. However, since 1976, when data encryption was selected as an official Federal Information Processing Standard (FIPS) for the United States, cryptography has gained large attention and a great amount of application and use. Furthermore, cryptography started to be part of protected public communication when e-mail became commonly used by the public. There are many electronic services. Some are based on web interaction and others are used as independent servers, called e-mail hosting services, which is an Internet hosting service that runs e-mail servers. Encrypting e-mail messages as they traverse the Internet is not the only reason to understand or use various cryptographic methods. Every time one checks his/her e-mail, the password is being sent over the wire. Many Internet service providers or corporate environments use no encryption on their mail servers and the passwords used to check mail are submitted to the network in clear text (with no encryption). When a password is put into clear text on a wire, it can easily be intercepted. Encrypting email will keep all but the most dedicated hackers from intercepting and reading a private communications. Using a personal email certificate one can digitally sign an email so that recipients can verify that it’s really from the sender as well as encrypt the messages so that only the intended recipients can view it. Web service is defined as “a software system designed to support interoperable machine-to-machine interaction over a network” and e-mail is “communicate electronically on the computer”. This chapter focus on introduce three topics: E-mail structure and organization, web service types, their organization and cryptography algorithms which integrated in the E-mail and web services to provide high level of security. The main issue in this article is to build the general foundation through Definitions, history, cryptography algorithms symmetric and asymmetric, hash algorithms, digital signature, suite B and general principle to introduce the use of cryptography in the E-mailand web service
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography