Is it possible to reduce the expected response time of every request at a web server, simply by changing the order in which we schedule the requests? That is the question we ask in this paper.This paper proposes a method for improving the... more
Is it possible to reduce the expected response time of every request at a web server, simply by changing the order in which we schedule the requests? That is the question we ask in this paper.This paper proposes a method for improving the performance of web servers servicing static HTTP requests. The idea is to give preference to requests for
This paper describes NIST's enhanced RBAC model and our approach to designing and implementing RBAC features for networked Web servers. The RBAC model formalized in this paper is based on the properties that were first described in... more
This paper describes NIST's enhanced RBAC model and our approach to designing and implementing RBAC features for networked Web servers. The RBAC model formalized in this paper is based on the properties that were first described in Ferraiolo and Kuhn [1992] and Ferraiolo et al. [1995], with adjustments resulting from experience gained by prototype implementations, market analysis, and observations made by Jansen [1988] and Hoffman [1996]. The implementation of RBAC for the Web (RBAC/Web) provides an alternative to the conventional means of administering and enforcing authorization policy on a server-by-server basis. RBAC/Web provides administrators with a means of managing authorization data at the enterprise level, in a manner consistent with the current set of laws, regulations, and practices.
This paper describes an RFID system mainly comprising an HF-RFID reader with an ethernet-based SOAP extension. SOAP is the abbreviation for Simple Object Access Protocol and provides the user with an easy-to-use alternative for exchanging... more
This paper describes an RFID system mainly comprising an HF-RFID reader with an ethernet-based SOAP extension. SOAP is the abbreviation for Simple Object Access Protocol and provides the user with an easy-to-use alternative for exchanging data with ...
Web presence has become a key consideration for the majority of companies and other organizations. Besides being an essential information delivery tool, the Web is increasingly being regarded as an extension of the organization itself,... more
Web presence has become a key consideration for the majority of companies and other organizations. Besides being an essential information delivery tool, the Web is increasingly being regarded as an extension of the organization itself, directly integrated with its operating processes. As this transformation takes place, security grows in importance. IBM Tivoli Access Manager offers a shared infrastructure for authentication and access management, technologies that have begun to emerge in the commercial marketplace. This paper describes the Authorization Service provided by IBM Tivoli Access Manager for e-business (AM) and its use by AM family members as well as third-party applications. Policies are defined over a protected object namespace and stored in a database, which is managed via a management console and accessed through an Authorization API. The protected object namespace abstracts from heterogeneous systems and thus enables the definition of consistent policies and their ce...
ABSTRACT Web Applications security has become progressively more important these days. Enormous numbers of attacks are being deployed on the web application layer. Due to dramatic increase in Web applications, security gets vulnerable to... more
ABSTRACT Web Applications security has become progressively more important these days. Enormous numbers of attacks are being deployed on the web application layer. Due to dramatic increase in Web applications, security gets vulnerable to variety of threats. Most of these attacks are targeted towards the web application layer and network firewall alone cannot prevent these kinds of attacks. The basic reason behind success of these attacks is the ignorance of application developers while writing the web applications and the vulnerabilities in the existing technologies. Web application attacks are the latest trend and hackers are trying to exploit the web application using different techniques. Various solutions are available as open source and in commercial market. But the selection of suitable solution for the security of the organizational systems is a major issue. This survey paper compared the Web Application Firewall (WAF) solutions with important features necessary for the security at application layer. Critical analysis on WAF solutions is helpful for the users to select the most suitable solution to their environments.
Most Erectile Dysfunction (ED patients are not willing to openly discuss their problems with friends and physicians. Because of this issue, this paper proposes a web based online diagnosis of Erectile Dysfunction using International Index... more
Cloud Data Servers is the novel approach for providing secure service to e-business .Millions of users are surfing the Cloud for various purposes, therefore they need highly safe and persistent services. Usually hackers target particular... more
Cloud Data Servers is the novel approach for providing secure service to e-business .Millions of users are surfing the Cloud for various purposes, therefore they need highly safe and persistent services. Usually hackers target particular Operating Systems or a Particular Controller. Inspiteof several ongoing researches Conventional Web Servers and its Intrusion Detection System might not be able to detect such attacks. So we implement a Cloud Data Server with Session Controller Architecture using Redundancy and Disconnected Data Access Mechanism. In this paper, we generate the hash code using MD5 algorithm. With the help of which we can circumvent even the attacks, which are undefined by traditional Systems .we implement Cloud Data Sever using Java and Hash Code backup Management using My SQL. Here we Implement AES Algorithm for providing more Security for the hash Code. The CDS using the Virtual Controller controls and monitors the Connections and modifications of the page so as to prevent malicious users from hacking the website. In the proposed approach an activity analyzer takes care of intimating the administrator about possible intrusions and the counter measures required to tackle them. The efficiency ratio of our approach is 98.21% compared with similar approaches.
ABSTRACT Web technology has provided an effective means of delivering and sharing decision support functionalities. This paper is a Web-based approach about Decision Support System (DSS) performance and focuses on the presentation of... more
ABSTRACT Web technology has provided an effective means of delivering and sharing decision support functionalities. This paper is a Web-based approach about Decision Support System (DSS) performance and focuses on the presentation of technical and conceptual parameters for DSS applications. A framework has been developed for the Web-based DSS performance evaluation. Overall performance of a Web-based DSS is included the conceptual and technical performance where the flexibility, scalability and security are conceptual performance factors and technical performance factors comprise the data access, TCP/IP and networking architecture, latency and throughput. This paper presents a detailed analysis of Web-based DSS performance evaluation by means of workload method.
ABSTRACT Web Applications security has become progressively more important these days. Enormous numbers of attacks are being deployed on the web application layer. Due to dramatic increase in Web applications, security gets vulnerable to... more
ABSTRACT Web Applications security has become progressively more important these days. Enormous numbers of attacks are being deployed on the web application layer. Due to dramatic increase in Web applications, security gets vulnerable to variety of threats. Most of these attacks are targeted towards the web application layer and network firewall alone cannot prevent these kinds of attacks. The basic reason behind success of these attacks is the ignorance of application developers while writing the web applications and the vulnerabilities in the existing technologies. Web application attacks are the latest trend and hackers are trying to exploit the web application using different techniques. Various solutions are available as open source and in commercial market. But the selection of suitable solution for the security of the organizational systems is a major issue. This survey paper compared the Web Application Firewall (WAF) solutions with important features necessary for the security at application layer. Critical analysis on WAF solutions is helpful for the users to select the most suitable solution to their environments.
The convergence of Web technology, wireless networks, and portable client devices provides new design opportunities for computer/communications systems. In the HP Labs' Cooltown project we have been exploring these opportunities... more
The convergence of Web technology, wireless networks, and portable client devices provides new design opportunities for computer/communications systems. In the HP Labs' Cooltown project we have been exploring these opportunities through an infrastructure to support Web presence for people, places and things. We put Web servers into things like printers and put information into Web servers about things like artwork; we group physically related things into places embodied in Web servers. Using URLs for addressing, physical URL beaconing and sensing of URLs for discovery, and localized Web servers for directories, we can create a location-aware but ubiquitous system to support nomadic users. On top of this infrastructure we can leverage Internet connectivity to support communications services. Web presence bridges the World Wide Web and the physical world we inhabit, providing a model for supporting nomadic users without a central control point
State-of-the-art cluster-based data centers consisting of three tiers (Web server, application server, and database server) are being used to host complex Web services such as e-commerce applications. The application server handles... more
State-of-the-art cluster-based data centers consisting of three tiers (Web server, application server, and database server) are being used to host complex Web services such as e-commerce applications. The application server handles dynamic and sensitive Web contents that need protection from eavesdropping, tampering, and forgery. Although the secure sockets layer (SSL) is the most popular protocol to provide a secure channel
In this paper we propose a new method for improv-ing the average response time of Web servers by cooper-atively caching the results of requests for dynamic content. The work is motivated by our recent study of access logs from the... more
In this paper we propose a new method for improv-ing the average response time of Web servers by cooper-atively caching the results of requests for dynamic content. The work is motivated by our recent study of access logs from the Alexandria Digital Library server at UCSB, ...
This paper describes a negotiation mechanism inserted in a Web server model with differentiated services. All the results of this article have been obtained by means of simulation using for this a queueing network model representing a Web... more
This paper describes a negotiation mechanism inserted in a Web server model with differentiated services. All the results of this article have been obtained by means of simulation using for this a queueing network model representing a Web server with QoS. The results also confirm that this new approach enhances the quality of service provided to clients, mainly in overload situations, being an aid in the process of request admission and dropping