Service-Oriented Architecture (SOA), which is an open architecture, provides developers with more freedom. However, its security problem goes from bad to worse. By taking an insurance business in Formal Concept Analys...Service-Oriented Architecture (SOA), which is an open architecture, provides developers with more freedom. However, its security problem goes from bad to worse. By taking an insurance business in Formal Concept Analysis (SOA-FCA) Service Components based Service Data Object (SDO) data model transfer with proxy as an example, the security issue of SDO data model was analyzed in this paper and this paper proposed a mechanism to make sure that the confidentiality, integrity, and non-repudiation of SDO data model are preserved by applying encryption/decryption, digest, digital signature and so on. Finally, this mechanism was developed and its performance was evaluated in SOA-FCA Service Components.展开更多
A new web product data management architecture is presented. The three-tier web architecture and Simple Object Access Protocol (SOAP) are combined to build the web-based product data management (PDM) system which incl...A new web product data management architecture is presented. The three-tier web architecture and Simple Object Access Protocol (SOAP) are combined to build the web-based product data management (PDM) system which includes three tiers: the user services tier, the business services tier, and the data services tier. The client service component uses the server-side technology, and Extensible Markup Language (XML) web service which uses SOAP as the communication protocol is chosen as the business service component. To illustrate how to build a web-based PDM system using the proposed architecture, a case PDM system which included three logical tires was built. To use the security and central management features of the database, a stored procedure was recommended in the data services tier. The business object was implemented as an XML web service so that client could use standard internet protocols to communicate with the business object from any platform. In order to satisfy users using all sorts of browser, the server-side technology and Microsoft ASP.NET was used to create the dynamic user interface.展开更多
This thesis introduces the e-learning system and Web Service technology. Then, it proposes how to apply Web Service technology to the e-learning system; and how to improve systematic flexibility and dependability. Fin...This thesis introduces the e-learning system and Web Service technology. Then, it proposes how to apply Web Service technology to the e-learning system; and how to improve systematic flexibility and dependability. Finally it provides the basic framework of the system and a simple realization according to related specification.展开更多
在使用服务数据对象SDO(Service Data Objects)过程中,针对SDO连接异构数据源存在的效率和一致性问题,提出一种面向文法和自动机的推理方法,同时,引入本体进行语义描述数据交换,增强SDO语义识别,并通过数据中介服务(DMS)建立一种异构数...在使用服务数据对象SDO(Service Data Objects)过程中,针对SDO连接异构数据源存在的效率和一致性问题,提出一种面向文法和自动机的推理方法,同时,引入本体进行语义描述数据交换,增强SDO语义识别,并通过数据中介服务(DMS)建立一种异构数据源访问数据图的图结构,根据数据图的需求变更以及数据访问服务(DAS)实现行图裁剪成一棵棵数据对象最优树,建立相应的优化数学模型,并通过蚁群算法优化寻优该模型。最后通过在开源件SDOAPI中引入策略应用表示:提高了不同的数据源访问效率,增强了数据交换的一致性和语义性。展开更多
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ...In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain.展开更多
文摘Service-Oriented Architecture (SOA), which is an open architecture, provides developers with more freedom. However, its security problem goes from bad to worse. By taking an insurance business in Formal Concept Analysis (SOA-FCA) Service Components based Service Data Object (SDO) data model transfer with proxy as an example, the security issue of SDO data model was analyzed in this paper and this paper proposed a mechanism to make sure that the confidentiality, integrity, and non-repudiation of SDO data model are preserved by applying encryption/decryption, digest, digital signature and so on. Finally, this mechanism was developed and its performance was evaluated in SOA-FCA Service Components.
基金the National Key Project Foundation of China (No. 2001BA201A0605) and partially supported by the State Key Lab for Mechanical Transmission..
文摘A new web product data management architecture is presented. The three-tier web architecture and Simple Object Access Protocol (SOAP) are combined to build the web-based product data management (PDM) system which includes three tiers: the user services tier, the business services tier, and the data services tier. The client service component uses the server-side technology, and Extensible Markup Language (XML) web service which uses SOAP as the communication protocol is chosen as the business service component. To illustrate how to build a web-based PDM system using the proposed architecture, a case PDM system which included three logical tires was built. To use the security and central management features of the database, a stored procedure was recommended in the data services tier. The business object was implemented as an XML web service so that client could use standard internet protocols to communicate with the business object from any platform. In order to satisfy users using all sorts of browser, the server-side technology and Microsoft ASP.NET was used to create the dynamic user interface.
文摘This thesis introduces the e-learning system and Web Service technology. Then, it proposes how to apply Web Service technology to the e-learning system; and how to improve systematic flexibility and dependability. Finally it provides the basic framework of the system and a simple realization according to related specification.
文摘在使用服务数据对象SDO(Service Data Objects)过程中,针对SDO连接异构数据源存在的效率和一致性问题,提出一种面向文法和自动机的推理方法,同时,引入本体进行语义描述数据交换,增强SDO语义识别,并通过数据中介服务(DMS)建立一种异构数据源访问数据图的图结构,根据数据图的需求变更以及数据访问服务(DAS)实现行图裁剪成一棵棵数据对象最优树,建立相应的优化数学模型,并通过蚁群算法优化寻优该模型。最后通过在开源件SDOAPI中引入策略应用表示:提高了不同的数据源访问效率,增强了数据交换的一致性和语义性。
文摘In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain.