scholarly journals Model-Based Approach to Ensuring Reliability and Security of Web-services

2020 ◽  
Vol 32 (5) ◽  
pp. 153-166
Author(s):  
Ekaterina Mikhailovna Lavrischeva ◽  
Sergey Vadimovich Zelenov

In the paper, we analyze problems of reliability and security in the world practice and in Russia. We consider aspects of modeling software/hardware systems from service resources and ready-made reuses with ensuring reliability and security. We present the formed basic and theoretical foundations of the modeling problem, the experience of using modern service tools SOA, SCA, SOAP in software/hardware systems and Web systems to ensure their reliability and security on the Internet. We note that software/hardware systems and Web systems are created by the assembly build method in modern environments: IBM WSDK + WebSphere, Apache Axis + Tomcat; Microsoft .Net + IIS, etc. Verification and testing of systems should be conducted for searching of errors that occur in exceptional cases (cyber-attacks, forbidden access to the database, etc.). We describe methods for analyzing such situations and applying reliability and security methods to ensure stable and trouble-free operation of software/hardware systems service components in the Internet information environment.

2009 ◽  
pp. 897-918
Author(s):  
Peter Bertok ◽  
Xinjian Xu

In a rapidly changing world, continuous adoption of new practices is crucial for survival; organizations embracing the latest technologies have a competitive edge. Smart organizations readily take on board new organizational forms and practices, those in particular that offer agility and responsiveness. The Internet and the World Wide Web offer a new way of collaboration via Web services, but heterogeneity of different service components make cooperation difficult. This chapter describes a new approach to combine Web services by employing a layered structure, in which composition of a value-added service can be built from individual components, and each service component can have semantically equivalent but syntactically different alternatives.


2021 ◽  
Vol 11 (16) ◽  
pp. 7738
Author(s):  
Kyounggon Kim ◽  
Faisal Abdulaziz Alfouzan ◽  
Huykang Kim

Cyber-attacks have become commonplace in the world of the Internet. The nature of cyber-attacks is gradually changing. Early cyber-attacks were usually conducted by curious personal hackers who used simple techniques to hack homepages and steal personal information. Lately, cyber attackers have started using sophisticated cyber-attack techniques that enable them to retrieve national confidential information beyond the theft of personal information or defacing websites. These sophisticated and advanced cyber-attacks can disrupt the critical infrastructures of a nation. Much research regarding cyber-attacks has been conducted; however, there has been a lack of research related to measuring cyber-attacks from the perspective of offensive cybersecurity. This motivated us to propose a methodology for quantifying cyber-attacks such that they are measurable rather than abstract. For this purpose, we identified each element of offensive cybersecurity used in cyber-attacks. We also investigated the extent to which the detailed techniques identified in the offensive cyber-security framework were used, by analyzing cyber-attacks. Based on these investigations, the complexity and intensity of cyber-attacks can be measured and quantified. We evaluated advanced persistent threats (APT) and fileless cyber-attacks that occurred between 2010 and 2020 based on the methodology we developed. Based on our research methodology, we expect that researchers will be able to measure future cyber-attacks.


Author(s):  
Michael Färber ◽  
Yulia Svetashova ◽  
Andreas Harth

AbstractIn this chapter, we consider the theoretical foundations for representing knowledge in the Internet of Things context. Specifically, we consider (1) the model-theoretic semantics (i.e., extensional semantics), (2) the possible-world semantics (i.e., intensional semantics), (3) the situation semantics, and (4) the cognitive/distributional semantics. Given the peculiarities of the Internet of Things, we pay particular attention to (a) perception (i.e., how to establish a connection to the world), (b) intersubjectivity (i.e., how to align world representations), and (c) the dynamics of world knowledge (i.e., how to model events). We come to the conclusion that each of the semantic theories helps in modeling specific aspects, but does not sufficiently address all three aspects simultaneously.


Author(s):  
I Ketut Sudaryana ◽  
Hadi Sanjaya ◽  
Ricky Tjong

The development of this age in the world is characterized by information technology. For a long time, humans can not be separated from technology. The development of Internet information technology effected the creation of the internet. The Internet sends people to communicate and search for information about anyone. How to find existing information is to open websites that exist on the internet. Website is a system where information in the form of text, images, sound, and others are presented in hypertext form. One of the websites that contain information is Versaillus. Versaillus is a website that contains information about a game called Mobile Legends and the manifold of Versaillus is a wiki’s site, but the website is not crowded by people. Therefore, the author will researching the site versaillus by using PIECES method. The results of this study can change the site versaillus to be better and better from PIECES method.


2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Justin K Haner ◽  
Robert K Knake

Abstract Malicious networks of botnets continue to grow in strength as millions of new users and devices connect to the internet each day, many becoming unsuspectingly complicit in cyber-attacks or unwitting accomplices to cybercrimes. Both states and nonstate actors use botnets to surreptitiously control the combined computing power of infected devices to engage in espionage, hacking, and to carry out distributed denial of service attacks to disable internet-connected targets from businesses and banks to power grids and electronic voting systems. Although cybersecurity professionals have established a variety of best practices to fight botnets, many important questions remain concerning why levels of botnet infections differ sharply from country to country, as relatively little empirical testing has been done to establish which policies and approaches to cybersecurity are actually the most effective. Using newly available time-series data on botnets, this article outlines and tests the conventionally held beliefs and cybersecurity strategies at every level—individual, technical, isolationist, and multilateral. This study finds that wealthier countries are more vulnerable than less wealthy countries; that technical solutions, including patching software, preventing spoofing, and securing servers, consistently outperform attempts to educate citizens about cybersecurity; and that countries which favor digital isolation and restrictions on internet freedom are not actually better protected than those who embrace digital freedom and multilateral approaches to cybersecurity. This latter finding is of particular importance as China’s attempts to fundamentally reshape the internet via the “Digital Silk Road” component of the Belt and Road Initiative will actually end up making both China and the world less secure. Due to the interconnected nature of threats in cyberspace, states should instead embrace multilateral, technical solutions to better govern this global common and increase cybersecurity around the world.


Author(s):  
Niko Garuda Adiyono ◽  
Tantri Yanuar Rahmat ◽  
Rina Anindita

Technological developments have brought new media related to the internet. The internet is currently a necessity for many people around the world because with the internet, information can be conveyed quickly and easily. In the world of business is also entered by the internet. The internet creates something new, one way of marketing product. A businessman finds the latest marketing strategy by creating digital content for the products they offer and they will distribute it on social media so that more people and potential consumers will see and know about the product. Social Media is an application that provides video making features along with very interesting and easy to use effect features. That way, not a few online business people take advantage of the golden opportunity to use the application. Social Media as a platform to develop their business a through digital content.


InterConf ◽  
2021 ◽  
pp. 137-141
Author(s):  
Aytan Huseynova-Gahramanli

Socio-cultural, socio-political, economic, scientific relations of the Azerbaijani language with international languages the expansion of the terminological system with new international units leads to the enrichment of this system. The socio-political processes taking place in the world, scientific and technological progress, and the introduction of the Internet information society cause the emergence of new terms of an international nature. These processes serve to enrich and diversify the terminological system of the language.


Author(s):  
Peter Bertok ◽  
Xinjian Xu

In a rapidly changing world, continuous adoption of new practices is crucial for survival; organizations embracing the latest technologies have a competitive edge. Smart organizations readily take on board new organizational forms and practices, those in particular that offer agility and responsiveness. The Internet and the World Wide Web offer a new way of collaboration via Web services, but heterogeneity of different service components make cooperation difficult. This chapter describes a new approach to combine Web services by employing a layered structure, in which composition of a value-added service can be built from individual components, and each service component can have semantically equivalent but syntactically different alternatives.


2000 ◽  
Vol 28 (3) ◽  
pp. 465-482 ◽  
Author(s):  
Richard A. Danner

This article examines the potential effects of the developing user-centered, networked information environment on scholarly communication in law. By “user-centered, networked information environment,” I mean the emerging environment for legal research and scholarship, in which most seekers and users of legal information will have ready desktop access to a networked computer and to applications that will allow them to communicate with colleagues around the world and enable them to retrieve increasing amounts of the information they need to be productive directly via the Internet, without needing to rely on locally held print sources.


Author(s):  
Adam Henschke

AbstractIn this chapter I present an argument that cyber-terrorism will happen. This argument is premised on the development of a cluster of related technologies that create a direct causal link between the informational realm of cyberspace and the physical realm. These cyber-enabled physical systems fit under the umbrella of the ‘Internet of Things’ (IoT). While this informational/physical connection is a vitally important part of the claim, a more nuanced analysis reveals five further features are central to the IoT enabling cyber-terrorism. These features are that the IoT is radically insecure, that the components of the IoT are in the world, that the sheer numbers of IoT devices mean potential attacks can be intense, that the IoT will likely be powered by a range of Artificial Intelligence aspects, making it inscrutable, and that the IoT is largely invisible. Combining these five factors together, the IoT emerges as a threat vector for cyber-terrorism. The point of the chapter is to go beyond recognising that the IoT is a thing in the world and so can enable physical impacts from cyber-attacks, to offer these five factors to say something more specific about just why the IoT can potentially be used for cyber-terrorism. Having outlined how the IoT can be used for cyber-terrorism, I attend to the question of whether such actions are actually terrorism or not. Ultimately, I argue, as the IoT grows in scope and penetration of our physical worlds and behaviours, it means that cyber-terrorism is not a question of if, but when. This, I suggest, has significant ethical implications as these five features of the IoT mean that we ought to be regulating these technologies.


Sign in / Sign up

Export Citation Format

Share Document