共查询到19条相似文献,搜索用时 46 毫秒
1.
随着Web应用的迅速增长,Web的服务质量(QoS)已经引起普遍关注。Web服务响应时间是用户评估Web服务质量最直观的一个参数。提出了一种基于HTTP测量Web服务响应时间的方法,并给出了在Visual C++的编译环境下使用WinSock控件编程的具体实现。测试软件独立于浏览器,实现了对Web服务器的实时测试、循环测试、平均响应时间测试以及不同站点响应时间测试功能。对程序设计中涉及的响应信息及其处理、基于HTTP的重定向等关键问题进行了详细讨论。测试结果表明软件运行稳定,能够满足对Web服务响应时间的各种测试需求。 相似文献
2.
3.
基于SIP的多媒体通信服务是IP网络的重要组成部分,提供综合的通信服务是网络运营商的主要目标之一。文章从Web Service和SIP相结合的角度出发,建立起一种WS-SIP节点模型,进一步提出基于WS-SIP的多媒体通信系统——WNET(WS-SIP NET)的框架结构。WNET不仅保持了基于SIP通信服务的简单,灵活等特性,同时具备提供整合网络服务的能力,可更好地满足运营商的要求。 相似文献
4.
5.
6.
随着网络的日益普及,将嵌入式系统接入网络的想法也变得更加现实。介绍一种基于MicroBlaze处理器的嵌入式Web服务器的设计方法。系统在Virtex4系列LX25芯片上,采用软核处理器MicroBlaze配置核心处理器。MicroBlaze软内核是一种针对Xilinx的FPGA器件而优化的功能强大的标准32位RISC处理器。网络协议采用Xilnet,这是Xilinx公司专门针对Xilinx嵌入式系统应用而设计的网络通信协议,接口芯片使用LAN91C111。基于MicroBlaze的嵌入式Web服务器能够达到预期的效果,用户可以通过IE浏览器浏览存储在DDR SDRAM芯片中的网页,由于CPU本身是以软核的方式实现,其功能可根据需要进行定制,非常灵活。该Web服务器基于HTTP协议,采用TCP/IP套接字编程技术实现,能够实现对工业现场的数据采集、远程监控以及信息的交互。 相似文献
7.
8.
论述由传统client/server结构升级到Intrant/Web应考虑的关键技术问题,并结合开发应用给出详细的实例。 相似文献
9.
介绍了两项Web服务事务标准:WS-Transaction和WS-CAF;从子规范之间的关系、功能点、协调协议类型、与现有标准关系四个方面对二者进行了互操作性分析;并从应用推广的角度对Web服务事务标准的发展趋势进行了分析. 相似文献
10.
11.
目前Web服务体系架构存在标准限制且需要支持多种类型的客户端的问题,因而使得Web服务的安全极具挑战。文章通过对Web服务的基本组件和协议的分析,说明了如何利用现有的技术来应对Web服务安全所面临的风险,并对一些基本的保护机制作了说明。在此基础上,提出了一种基于标准的、新的安全体系架构,满足企业的Web服务安全需要。 相似文献
12.
An Overview of Web Services Security 总被引:1,自引:0,他引:1
Security and Web Services are consistently reported among the top technologies of interest to businesses. Concerns about security
are a major deterrent to companies considering use of the technology. This paper attempts to give an overview of the current
state of Web Services security. The main body of the paper is a tour through key concepts used in Web Services security. Examples
based on software demonstrators built by the authors are used to explain how the ideas are used in combination to achieve
particular aims. The state of play as regards standards is also reviewed. The concluding section gives some pointers as to
active research topics.
This revised version was published online in July 2006 with corrections to the Cover Date. 相似文献
13.
《Communications Surveys & Tutorials, IEEE》2009,11(3):4-21
XML and Web services are widely used in current distributed systems. The security of the XML based communication, and the Web services themselves, is of great importance to the overall security of these systems. Furthermore, in order to facilitate interoperability, the security mechanisms should preferably be based on established standards. In this paper we provide a tutorial on current security standards for XML and Web services. The discussed standards include XML Signature, XML Encryption, the XML Key Management Specification (XKMS), WS-Security, WS-Trust, WS-SecureConversation, Web Services Policy, WS-SecurityPolicy, the eXtensible Access Control Markup Language (XACML), and the Security Assertion Markup Language (SAML). 相似文献
14.
提出了一个基于情境的web服务安全模型,该模型通过定义高层次的策略规则,Agent能在不中止web服务运行的情况下动态控制用户的访问.通过对用户及web服务的情境信息的收集和管理,使得访问控制在决策时能够动态适应环境的变化. 相似文献
15.
16.
Bo Yu Lin Yang Yongjun Wang Bofeng Zhang Yuan Cao Linru Ma Xiangyang Luo 《Wireless Personal Communications》2013,73(4):1349-1367
A primary problem for security aware Web service discovery is how to discover security capabilities of Web services and how these security capabilities can be matched with security requirements of various requesters. Presently, most approaches are based on syntactic matching, which is prone to result in false negative because of lacking of semantics. In this paper, we propose a rule-based approach to decide whether security capabilities match security requirements. Based on a semantic model of security policy, security capabilities are inferred from security policy of Web services. General Web service security ontology is proposed to semantically model security requirements of various service requesters. The architecture of rule-based matching engine is also presented to describe the whole matching process. The prototype system and case study show that the proposed approach is flexible and feasible. 相似文献
17.
In this paper we revisit the concept of mandatory access control and investigate its potential with personal digital assistants (PDA). Only if applications are clearly separated and Trojans cannot leak personal information can these PDAs become personal trusted devices. Limited processing power and memory can be overcome by using Web services instead of full-fledged applications – a trend also in non-mobile computing. Web services, however, introduce additional security risks, some of them specific for mobile users. We propose an identification scheme that can be effectively used to protect privacy and show how this system builds upon a light-weight version of mandatory access control. 相似文献
18.
韦彦 《信息安全与通信保密》2008,(6):24-26
对Web服务,XKMS以及SAML的特点及结合的可能性进行了分析,并结合XKMS与传统的PKI设计了基于XKMS的统一密钥管理子层,结合SAML设计了SSO子层,最后给出了一个基于XKMS和SAML的扩展的Web服务安全模型的层次结构。 相似文献