Version-1 (May-June 2015)
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | A Survey on Authorization Systems for Web Applications |
| Country | : | India |
| Authors | : | Mr. Midhun TP || Mr.Prasanth Kumar PV || Mr. Anoop Jose |
Abstract: Web services are the most important point of usage for the modern web architecture. The Service oriented architecture (SOA) used in web services offers a simple platform for integrating heterogeneous distributed web applications and service. The distributed and open nature of the present system makes it vulnerable to security issues such as Web service Description Language (WSDL) spoofing, Middleware Hijacking, etc. Assuring security for the web services to solve all security flaws is difficult. Authorization is an important aspect for assuring security. Authorization failure can create much vulnerability for the system security using web services which are distributed in nature. In this paper a survey of the authorization techniques for web services based application.
Keywords: web services, authorization, access control in web services, attacks on web services
[1]. Vorobiev, A. and Han, J. (2006) ‗Security attack ontology for web services', Proceedings of the Second International Conference on Semantics, Knowledge, and Grid (SKG'06), 2006, pp. 42.
[2]. E. Yuan and J. Tong. Attribute based access control (ABAC): a new access control approach for service oriented architectures. Ottawa New Challenges for Access Control Workshop, April 2005
[3]. SOA: principles of service design, Thomas Erl, New York: Macmillan ,2008
[4]. Martin Gudgin, Marc Hadley, Noah Mendelsohn, Jean-Jacques Moreau, and Henrik Frystyk Nielsen. SOAP Version 1.2 Part 1: Messaging Framework. W3C Recommendation,2003.
[5]. M. Naedele, ―Standards for XML and Web services security,‖ IEEE Computer, vol. 36, no. 4, pp. 96–98, Apr. 2003.
[6]. B. Thuraisingham, ―Security standards for the semantic web,‖ ComputStand. Interfaces, vol. 27, no. 3, pp. 257–268, Mar. 2005.
[7]. Schahram Dustdar, Wolfgang Schreiner .A survey on web services composition, International Journal of Web and Grid Services Volume: 1, Issue: 1, Inderscience (2005)
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | A New Skin Color Based Face Detection Algorithm by Combining Three Color Model Algorithms |
| Country | : | Iraq |
| Authors | : | Hewa Majeed Zangana |
Abstract: Human face recognition systems have gained a considerable attention during last decade due to its vast applications in the field of computer and advantages over previous biometric methods. There are many applications with respect to security, sensitivity and secrecy. Face detection is the most important and first step of recognition system. Human face detection suffers from various challenges due to variation regarding image conditions, size, resolution, poses and rotation. Its accurate and robust detection has been a great task for the researchers. There exist various numbers of methods and techniques for face detection but none can guarantee successful in all conditions for all kinds of faces and images. Some methods are exhibiting good results in certain conditions and others are good with different kinds of images. Face detection based on skin color is found to be more effective technique because of the properties of skin color which is unique and can be easily separated from the other objects present in the image and background.
[1]. Hong, S. and al, e, "Facial feature detection using Geometrical face model: An efficient approach," journal of pattern recognition, Vols. 31, No. 3, pp. 273-282, 1998.
[2]. Leung, C, "Real Time Face Recognition," B. Sc. Project, School of Information Technology and Electrical Engineering. University of Queesland, 2001.
[3]. Sanjay Kr, Singh, D. S. Chauhan, Mayank Vatsa and Richa Singh, "A Robust Skin Color Based Face Detection Algorithm," Tamkang Journal of Science and Engineering, vol. 6 (4), pp. 227-234, 2003.
[4]. Muhammad Tariq Mahmood, "Face Detection by Image Discriminating," 2006. [Online]. Available: http://www.bth.se/fou/cuppsats.nsf/all/6c509ae86a297ca4c12571d300512cac/$file/DVD009-MasterThesisReport.pdf..
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Load Rebalancing for Distributed Hash Tables in Cloud Computing |
| Country | : | Iraq |
| Authors | : | Ahmed Hassan A/Elmutaal || Dr. Amin Babiker A/Nabi Mustafa |
Abstract: In cloud computing applications are provided and managed by the cloud server and data is also stored remotely in cloud configuration. As Cloud Computing is growing rapidly and clients are demanding more services and better results, load balancing for the Cloud has become a very interesting and important research area. Load balancing ensures that all the processor in the system or every node in the network does approximately the equal amount of work at any instant of time. In this paper, a fully distributed load rebalancing algorithm is presented to cope with the load balance problem. Our algorithm is compared against a centralized approach in a production system and a competing distributed solution presented in the literature.
[1]. Xu, Gaochao, Junjie Pang, and Xiaodong Fu. "A load balancing model based on cloud partitioning for the public cloud." IEEE Tsinghua Science and Technology, Vol. 18, no. 1, pp. 34-39, 2013.
[2]. P. Mell and T. Grance, ―The NIST definition of cloud Computing‖, online available at: http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf, 2012.
[3]. N. G. Shivaratri, P. Krueger, and M. Singhal, ―Load distributing for locally distributed systems‖, Journal Computer, vol. 25, no. 12, pp. 33-44, Dec. 1992.
[4]. Zhu, Yan, Huaixi Wang, Zexing Hu, Gail-JoonAhn, Hongxin Hu, and Stephen S. Yau. "Efficient provable data possession for hybrid clouds." In Proceedings of the 17th ACM conference on Computer and communications security, pp. 756-758. ACM, 2010.
[5]. A. Rouse, ―Public cloud‖, available at: http://searchcloudcomputing.techtarget.com/definition/public-cloud.