Buscar
Mostrando ítems 1-10 de 847
Mobile Agents Meet Web Services
(IGI Global, 2007)
Web services standards provide the basis for interoperability, discovery and integration of distributed applications. Web services will enable mobile agents to better use and exploit Web accessible applications and resources. ...
A Security Proposal Based on a Real Time Agent to Protect Web Services Against DoS Attack
(2012-07-02)
This paper describes a novel proposal based on a real time agent to detect and block denial of service attacks within web services environments. The real time agent incorporates a classification mechanism based on a Case-Base ...
AIDeM: Agent-Based Intrusion Detection Mechanism
(2010-07-02)
The availability of services can be comprimised if a service request sent to the web services server hides some form of attack within its contents. This article presents AIDeM (An Agent-Based Intrusion Detection Mechanism), ...
Protecting Web Services against DoS Attacks: A Case-Based Reasoning Approach
(06/23/2010)
The real-time detection is a key factor to detect and block DoS attacks within Web services. DoS attacks can be generated for different techniques that take advantage of points vulnerable within Web services. This paper ...
An Adaptive Multi-agent Solution to Detect DoS Attack in SOAP Messages
(2009-07-01)
A SOAP message can be affected by a DoS attack if the incoming message has been either created or modified maliciously. The specifications of existing security standards do not focus on this type of attack. This article ...
S-MAS: An adaptive hierarchical distributed multi-agent architecture for blocking malicious SOAP messages within Web Services environments
(05/01/2011)
During the last years the use of Web Service-based applications has notably increased. However, the security has not evolved proportionally, which makes these applications vulnerable and objective of attacks. One of the ...
Detecting DoS Attack in Web Services by Using an Adaptive Multiagent Solution
(07/01/2013)
One of the most frequent techniques of a DoS attack is to exhaust available resources (memory, CPU cycles, and bandwidth) on the host server. A SOAP message can be affected by a DoS attack if the incoming message has been ...
SWAM: A logic-based mobile agent programming language for the Semantic Web
(Pergamon-Elsevier Science Ltd, 2011-03)
Once a big repository of static data, the Web has been gradually evolved into a worldwide network of information and services known as the Semantic Web. This environment allows programs to autonomously interact with ...
Fábrica de adequação de conteúdos de ensino para objetos de aprendizagem reutilizáveis (RLOs) respeitando a norma SCORM
(Universidade do Vale do Rio do Sinos, 2006-03-14)
To promote learning object reusability it is necessary to provide the normalization of its contents
so that they can work appropriately in any e-learning system. The normalization alows easy
reusability, portability of ...