Technical University of Vienna

Displaying 1-7 of 7 results

  • White Papers // Jan 2012

    Preventing Cross Site Request Forgery Attacks

    The web has become an indispensable part of the people lives. Unfortunately, as the people dependency on the web increases, so does the interest of attackers in exploiting web applications and web-based information systems. Previous work in the field of web application security has mainly focused on the mitigation of...

    Provided By Technical University of Vienna

  • White Papers // Jan 2011

    Internet Security

    This chapter describes security threats that systems face when they are connected to the Internet. The authors discuss their security requirements, potential security threats and different mechanisms to combat these. In addition, the text presents the two most popular protocols (SSL and its successor TLS) to secure data transmitted over...

    Provided By Technical University of Vienna

  • White Papers // Jan 2011

    Using Static Program Analysis to Aid Intrusion Detection

    The Internet, and in particular the world-wide web, have become part of the everyday life of millions of people. With the growth of the web, the demand for on-line services rapidly increased. Today, whole industry branches rely on the Internet to do business. Unfortunately, the success of the web has...

    Provided By Technical University of Vienna

  • White Papers // Dec 2009

    Autonomic Resource Virtualization in Cloud-Like Environments

    Cloud computing is a newly emerged computing infrastructure that builds on the latest achievements of diverse research areas, such as grid computing, service-oriented computing, business process management and virtualization. An important characteristic of Cloud-based services is the provision of non-functional guarantees in the form of Service Level Agreements (SLAs), such...

    Provided By Technical University of Vienna

  • White Papers // Sep 2009

    An End-to-End Approach for QoS-Aware Service Composition

    A simple and effective composition of software services into higher-level composite services is still a very challenging task. Especially in enterprise environments, Quality of Service (QoS) concerns play a major role when building software systems following the Service-Oriented Architecture (SOA) paradigm. In this paper authors present a composition approach based...

    Provided By Technical University of Vienna

  • White Papers // Mar 2009

    VieSLAF Framework: Increasing the Versatility of Grid QoS Models by Applying Semi-Automatic SLA-Mappings

    Novel computing paradigms like Grid and Cloud computing facilitate efficient, flexible, and on demand provision of the computational resources. In such models users usually pay for the resource usage and expect that nonfunctional requirements are satisfied, as for example, in terms of execution time, reliability, and availability. Non-functional requirements are...

    Provided By Technical University of Vienna

  • White Papers // Nov 2008

    Data Quality - What Can an Ontological Analysis Contribute?

    Progress in research on data quality is slow and relevance of results for practice is low. Can an ontological analysis make significant contributions? The "Road block" in data quality research seems to be an ontological one. Approaching "Data quality" with an ordinary language philosophy method reveals the inherent contradiction in...

    Provided By Technical University of Vienna

  • White Papers // Nov 2008

    Data Quality - What Can an Ontological Analysis Contribute?

    Progress in research on data quality is slow and relevance of results for practice is low. Can an ontological analysis make significant contributions? The "Road block" in data quality research seems to be an ontological one. Approaching "Data quality" with an ordinary language philosophy method reveals the inherent contradiction in...

    Provided By Technical University of Vienna

  • White Papers // Jan 2011

    Internet Security

    This chapter describes security threats that systems face when they are connected to the Internet. The authors discuss their security requirements, potential security threats and different mechanisms to combat these. In addition, the text presents the two most popular protocols (SSL and its successor TLS) to secure data transmitted over...

    Provided By Technical University of Vienna

  • White Papers // Jan 2011

    Using Static Program Analysis to Aid Intrusion Detection

    The Internet, and in particular the world-wide web, have become part of the everyday life of millions of people. With the growth of the web, the demand for on-line services rapidly increased. Today, whole industry branches rely on the Internet to do business. Unfortunately, the success of the web has...

    Provided By Technical University of Vienna

  • White Papers // Sep 2009

    An End-to-End Approach for QoS-Aware Service Composition

    A simple and effective composition of software services into higher-level composite services is still a very challenging task. Especially in enterprise environments, Quality of Service (QoS) concerns play a major role when building software systems following the Service-Oriented Architecture (SOA) paradigm. In this paper authors present a composition approach based...

    Provided By Technical University of Vienna

  • White Papers // Mar 2009

    VieSLAF Framework: Increasing the Versatility of Grid QoS Models by Applying Semi-Automatic SLA-Mappings

    Novel computing paradigms like Grid and Cloud computing facilitate efficient, flexible, and on demand provision of the computational resources. In such models users usually pay for the resource usage and expect that nonfunctional requirements are satisfied, as for example, in terms of execution time, reliability, and availability. Non-functional requirements are...

    Provided By Technical University of Vienna

  • White Papers // Dec 2009

    Autonomic Resource Virtualization in Cloud-Like Environments

    Cloud computing is a newly emerged computing infrastructure that builds on the latest achievements of diverse research areas, such as grid computing, service-oriented computing, business process management and virtualization. An important characteristic of Cloud-based services is the provision of non-functional guarantees in the form of Service Level Agreements (SLAs), such...

    Provided By Technical University of Vienna

  • White Papers // Jan 2012

    Preventing Cross Site Request Forgery Attacks

    The web has become an indispensable part of the people lives. Unfortunately, as the people dependency on the web increases, so does the interest of attackers in exploiting web applications and web-based information systems. Previous work in the field of web application security has mainly focused on the mitigation of...

    Provided By Technical University of Vienna