The EasySOC Project: A Rich Catalog of Best Practices for Developing Web Service Applications

Author(s):  
Juan Manuel Rodriguez ◽  
Marco Crasso ◽  
Cristian Mateos ◽  
Alejandro Zunino ◽  
Marcelo Campo
Keyword(s):  
Author(s):  
Aliaksandr Birukou ◽  
Enrico Blanzieri ◽  
Paolo Giorgini

People belong to different communities: business communities, Web 2.0 communities, just to name a few. In this chapter the authors show that experience acquired by people in communities constitute community culture. The authors introduce the problem of culture transfer between or within communities and propose a domain-independent approach for transferring community culture. First, the authors formalize the notion of culture, which includes behavior, knowledge, artifacts, best practices, etc. Second, using this formalism, the authors propose the Implicit Culture Framework, which is an agent-based framework for transferring behavior between community members or between communities. Finally, the authors present and evaluate a system for web service discovery developed using the Implicit Culture Framework.


2008 ◽  
pp. 206-227
Author(s):  
Konstantin Beznosov

This chapter reports on our experience of designing and implementing an architecture for protecting enterprise-grade Web service applications hosted by ASP.NET. Security mechanisms of Microsoft ASP.NET container—a popular hosting environment for Web services—have limited scalability, flexibility, and extensibility. They are therefore inade-quate for hosting enterprise-scale applications that need to be protected according to diverse and/or complex application-specific security policies. To overcome the limitations of ASP.NET security, we developed a flexible and extensible protection architecture. Deployed in a real-world security solution at a financial organization, the architecture enables integra-tion of ASP.NET into the organizational security infrastructure with reduced effort on the part of Web Service developers. Throughout this report, we discuss our design decisions, suggest best practices for constructing flexible and extensible authentication and authoriza-tion logic for Web Services, and share lessons learned.


2008 ◽  
pp. 318-344 ◽  
Author(s):  
Asif Akram ◽  
David Meredith

This chapter shows how the WSDL interface style (RPC / Document), strength of data typing and approach to data binding and validation have important implications on application security (and interoperability). This is because some (common) bad-practices and poor implementation choices can render a service vulnerable to the consequences of propagating loosely bound or poorly constrained data. The chosen Web service style and strength of data typing dictate how SOAP messages are constructed and serialized, and to what extent SOAP messages can be constrained and secured during validation. The chosen approach to binding and validation dictates how and where the SOAP-body and SOAP-header (which includes the security constructs) are handled in the application, and also determines the reliability of message parsing. The authors show how these Web service styles and implementation choices must be carefully considered and applied correctly by providing implementation examples and best practice recommendations.


Author(s):  
Hossain Shahriar ◽  
Victor Clincy ◽  
William Bond

Web services are being widely used for business integration. Understanding what these web services are and how they work is important. Attacks on these web services are a major concern and can expose an organizations' valuable resources. This chapter performs a survey describing web service attacks. The authors provide a taxonomy of web service vulnerabilities and explain how they can be exploited. This chapter discusses some of the approaches that make up best practices and some that are in the development phase. They also discuss some common approaches to address the vulnerabilities. This chapter discusses some of the approaches to be using in planning and securing web services. Securing web services is a very important part of a cybersecurity plan.


2018 ◽  
Vol 12 (3) ◽  
pp. 175 ◽  
Author(s):  
Festim Halili ◽  
Erenis Ramadani

The interest on Web services has been growing rapidly in these couple of years since their start of use. A web service would be described as a method for exchanging/communicating information between devices over a network. Often, when deciding which service would fit on the architecture design to develop a product, then the question rises which service to use and when?SOAP (Simple Object Access Protocol) and REST (Representational State Transfer) are the two most used protocols to exchange messages, so choosing one over the other has its own advantages and disadvantages. In this paper we have addressed the differences and best practices when to use one over the other.


Author(s):  
Kristen Izaryk ◽  
Robin Edge ◽  
Dawn Lechwar

Purpose The purpose of this article is to explore and describe the approaches and specific assessment tools that speech-language pathologists are currently using to assess social communication disorders (SCDs) in children, in relation to current best practices. Method Ninety-four speech-language pathologists completed an online survey asking them to identify which of the following approaches they use to assess children with SCD: parent/teacher report, naturalistic observation, formal assessment, language sample analysis, interviews, semistructured tasks, and peer/self-report. Participants were also asked to identify specific assessment tools they use within each approach. Results Participants most commonly assess SCDs by combining interviews, naturalistic observation, language sampling, parent/teacher report, and formal assessment. Semistructured tasks and peer/self-report tools were less frequently utilized. Several established parent/teacher report and formal assessment tools were commonly identified for assessing SCDs. Most participants use an informal approach for interviews, language sampling, and naturalistic observations in their SCD assessment process. Conclusions Generally, participants follow best practices for assessing SCDs by combining several different approaches. Some considerations for future assessment are identified, including the use of established protocols in the place of informal approaches in order to make the assessment of SCDs more systematic. Future directions for research are discussed.


Author(s):  
Elena Dukhovny ◽  
E. Betsy Kelly

According to the 2010 U.S. Census, over 20% of Americans speak a language other than English in the home, with Spanish, Chinese, and French being the languages most commonly spoken, aside from English. However, few augmentative and alternative communication (AAC) systems offer multilingual support for individuals with limited functional speech. There has been much discussion in the AAC community about best practices in AAC system design and intervention strategies, but limited resources exist to help us provide robust, flexible systems for users who speak languages other than English. We must provide services that take into consideration the unique needs of culturally and linguistically diverse users of AAC and help them reach their full communication potential. This article outlines basic guidelines for best practices in AAC design and selection, and presents practical applications of these best practices to multilingual/multicultural clients.


2009 ◽  
Vol 18 (4) ◽  
pp. 137-145 ◽  
Author(s):  
Samuel Sennott ◽  
Adam Bowker

People with ASD often need to access AAC in situations where a tabletop digital device is not practical. Recent advancements have made more powerful, portable, and affordable communication technologies available to these individuals. Proloquo2Go is a new portable augmentative and alternative communication system that runs on an iPhone or iPod touch and can be used to meet the diverse needs of individuals with autism spectrum disorders (ASD) who are ambulatory and have difficulty using speech to meet their full daily communication needs. This article examines Proloquo2Go in light of the best practices in AAC for individuals with ASD such as symbols, visual supports, voice output, and inclusion.


2005 ◽  
Vol 8 (1) ◽  
pp. 16-18
Author(s):  
Howard F. Wilson
Keyword(s):  

2016 ◽  
Vol 1 (6) ◽  
pp. 47-54 ◽  
Author(s):  
Jeffrey J. DiGiovanni ◽  
Travis L. Riffle

The search for best practices in hearing aid fittings and aural rehabilitation has generally used the audiogram and function stemming from peripheral sensitivity. In recent years, however, we have learned that individuals respond differently to various hearing aid and aural rehabilitation techniques based on cognitive abilities. In this paper, we review basic concepts of working memory and the literature driving our knowledge in newer concepts of hearing aid fitting and aural rehabilitation.


Sign in / Sign up

Export Citation Format

Share Document