• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 21
  • 12
  • 5
  • 5
  • 4
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 61
  • 50
  • 41
  • 36
  • 22
  • 21
  • 20
  • 15
  • 13
  • 11
  • 8
  • 8
  • 7
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

A secure web service : Specification on how to implement a secure Web service in a health care environment

Bill, Andreas, Persson, Robert January 2005 (has links)
<p>Background: With Web service growing popularity more and more companies chose to apply Web service in their organisation. With the rising usage of the concept the demands rise with it. For companies that deal with vulnerable information for example hospitals, there needs to be strong security measures taken.</p><p>Purpose: The aim of the report is to examine different security functions that can help developers to secure Web service applications. The report will be written so that organisations such as health care organisation can get insight on how to use a secure Web services in their line of work.</p><p>Method: One of the main methods used in this report is a qualitative hermeneutic way of thinking. The research process will apply Wallace’s model. The theoretical study is achieved with research on the subject through literature studies and published articles. Interviews that are used to gain knowledge are structured as quality orientated science surveys with semistandardised questions.</p><p>Conclusions: We believe the time has come for hospitals to investigate if Web service can help their organization. In case they choose to use Web services, we advise them to follow Web service Security’s recommendations to produce a web service that is adapted to their security needs.</p>
42

Developing Jxta Applications For Mobile Devices And Invoking Web Services Deployed In Jxta Platform From Mobile Devices

Bahadir, Mesut 01 December 2004 (has links) (PDF)
Today, Peer-to-peer (P2P) computing and Web Services play an important role in networking and computing. P2P computing, that aims addressing all the resources in a network and sharing them, is an old paradigm that gains importance nowadays with the advent of popular file sharing and instant messaging applications. On the other hand, a Web service is a software system that has an interface allowing applications to interact with other applications through Internet or intranet. Providing methods for publishing and discovering Web services from which mobile devices can facilitate in a P2P environment enables exploitation of P2P and Web service technologies efficiently by mobile devices. This also extends the range of devices that facilitate P2P and Web services technologies from servers and desktop computers to personal digital assistants (PDAs) and mobile phones. In this thesis, an architecture that enables publishing and discovering Web services for mobile clients that are inter-connected in a P2P environment is introduced. Key issues in this architecture are allowing mobile devices to join in a P2P network group, publishing Web services and discovering these services in P2P network. Invoking Web services that are published and discovered is another key issue in this architecture. The architecture introduced exploits P2P and Web services standards using various tools for mobile devices. For the purpose of organizing a P2P environment, JXTA protocols and services are used. WSDL is used for describing Web services. JXTA advertisements help in publication and discovery of Web services / and BPEL enables composition, deployment and execution of Web services. The architecture introduced within the scope of this thesis combines all these standards with tools that enable use of these standards on mobile devices. The work done in this thesis is realized as a part of Artemis, a project funded by European Commission for providing interoperability of medical information systems.
43

Konzipierung und Implementierung von Web Services zur Terminplanung

Trouvain, Holger. January 2003 (has links)
Konstanz, FH, Diplomarb., 2003.
44

Web Services : Aspekter på nya affärsmöjligheter / Web Services : Aspects on new business possibilites

Petrovic, Andreas, Andersson, Jonas January 2002 (has links)
E-business innebär att företag använder Internetteknologier eller nätverksteknologier för att skapa större affärsnytta i deras affärsprocesser. För att kunna genomföra automatiserade affärsprocesser krävs att de olika system som används är interoperabla, d v s kan kommunicera och fungera ihop på ett effektivt sätt. Målet med Web Services är att skapa hög interoperabilitet, vilket gör denna teknik lämplig för e-business. Företag kan specialicera sig på att skapa specifika Web Services. Dessa Web Services kan sedan vara byggstenar åt andra företags tjänster. Det krävs då att Web Services kan integreras på ett bra sätt så att de verkligen bildar en affärsprocess. Därför är även frågor kring hur integration mellan Web Services ska gå till, viktigt ur ett e-bussiness perspektiv. Det vi kommit fram till är att det går att minimera integrationsproblemen genom att anvä nda de mest standardiserade protokollen och följa vissa riktlinjer vid skapandet av Web Services. Dessutom går det att testa interoperabiliteten på den skapade Web Servicen genom att använda olika testverktyg såsom XMLBus. Vi tror att Web Services är den definitiva tekniken för framtida e-business. Med den snabba utvecklingen som nu sker på området anser vi att det inte dröjer alltför lång tid innan företag kan få tilltro till tekniken och därmed börjar använda den. Förhoppningsvis skyndar överrenskommelser i form av kontrakt mellan kund och leverantör, s k Service Layer Agreements, på denna process.
45

A secure web service : Specification on how to implement a secure Web service in a health care environment

Bill, Andreas, Persson, Robert January 2005 (has links)
Background: With Web service growing popularity more and more companies chose to apply Web service in their organisation. With the rising usage of the concept the demands rise with it. For companies that deal with vulnerable information for example hospitals, there needs to be strong security measures taken. Purpose: The aim of the report is to examine different security functions that can help developers to secure Web service applications. The report will be written so that organisations such as health care organisation can get insight on how to use a secure Web services in their line of work. Method: One of the main methods used in this report is a qualitative hermeneutic way of thinking. The research process will apply Wallace’s model. The theoretical study is achieved with research on the subject through literature studies and published articles. Interviews that are used to gain knowledge are structured as quality orientated science surveys with semistandardised questions. Conclusions: We believe the time has come for hospitals to investigate if Web service can help their organization. In case they choose to use Web services, we advise them to follow Web service Security’s recommendations to produce a web service that is adapted to their security needs.
46

Mobilní asistent pro cestování MHD / Mobile Public Transportation Assistant

Tůma, Jan January 2017 (has links)
This thesis is a documentation covering complete design and implementation of a mobile public transportation assistant for Brno. The resulting solution consists of a mobile application and a server part. The mobile application allow user with actual position of public transport vehicles and positon of smart device navigate and determine optimal route. The server part includes web service for client-server communication.
47

Monitorování provozu sítě pomocí dlouhodobě pracujícího analyzátoru / Network Traffic Monitoring using Long Working Analyser

Gilík, Aleš January 2015 (has links)
This diploma thesis is focused on network monitoring. The theoretical part describes using of detection and prevention systems, properties of these systems, their components and detection techniques. Next part of the thesis is focused on EndaceProbe analyzer and analytic application EndaceVision. Also web services, programming language WSDL and protocol SOAP are described. The practical part is focused on creating three laboratory exercises for network monitoring and for using EndaceProbe. Components of the exercises are the traffic generator IXIA and Cisco switches with the application of remote switched port analyzer. There are also used web services EndaceProbe, programming language WSDL and SOAP protocol.
48

Developing A Secure Web Service for License Management in StruSoft

Russell, Dave Alfanso January 2005 (has links)
<p>As software increases in complexity and relies more on Internet and Web technology, the challenge of enabling interaction and communication between loosely coupled applications becomes increasingly vital. Distributed computing presents challenges to loosely coupled applications that require means with which to interact and communicate. There exist technologies that are aimed at solving these problems; Web service is one such technology. Web service is a relatively new and rapidly maturing technology in the area of distributed computing; it offers a standards-based way to exchange information in an interoperable manner. This thesis is done in partnership with StruSoft and attempts to provide a solution to their problem of distributed computing, by using Web service technology. The paper looks at distributed systems and various solutions to the problems associated with distributed computing. A comprehensive insight into Web service technology is provided, along with rationale as to why it is chosen for the project. In addition, there are guidelines as to how the necessary components of Web service are installed. Development of License Management Software is also a part of this thesis. The software offers a means with which to store and maintain data about customers and their licenses. Security is a major focus of this paper and thus extensively mentioned throughout. A detailedexplanation of computer security is presented, along with the necessary configurations that are needed to make the Web service and the License Management Software more secure.</p>
49

XML-based Frameworks for Internet Commerce and an Implementation of B2B e-procurement

Zhao, Yuxiao January 2001 (has links)
<p>It is not easy to apply XML in e-commerce development for achieving interoperability in heterogeneous environments. One of the reasons is a multitude of XML-based Frameworks for Internet Commerce (XFIC), or industrial standards. This thesis surveys 15 frameworks, i.e., ebXML, eCo Framework, UDDI, SOAP, BizTalk, cXML, ICE, Open Applications Group, RosettaNet, Wf-XML, OFX, VoiceXML, RDF, WSDL and xCBL.</p><p>This thesis provides three models to systematically understand how the 15 frameworks meet the requirements of e-commerce. A hierarchical model is presented to show the purpose and focus of various XFIC initiatives. A relationship model is given to show the cooperative and competitive relationships between XFIC. A chronological model is provided to look at the development of XFIC. In addition, the thesis offers guidelines for how to apply XFIC in an e-commerce development.</p><p>We have also implemented a B2B e-procurement system. That not only demonstrates the feasibility of opensource or freeware, but also validates the complementary roles of XML and Java: XML is for describing contents and Java is for automating XML documents (session handling). Auction-based dynamic pricing is also realized as a feature of interest. Moreover, the implementation shows the suitability of e-procurement for educational purposes in e-commerce development.</p> / Report code: LiU-Tek-Lic-2001:19.
50

Reutilización de servicios web mediante componentes integrados

Granell Canut, Carlos 20 July 2006 (has links)
Desde los inicios de la era de la información la reutilización ha supuesto una práctica habitual para el desarrollo de aplicaciones software. Actualmente, la reutilización de software continúa siendo una aspecto esencial en los sistemas de información actuales por el uso de componentes software, vistos como colecciones de código reutilizables que facilitan el desarrollo de aplicaciones software.La aparición de los servicios web ha proporcionado un modelo diferente para el desarrollo de aplicaciones, ofreciendo la capacidad de acceder a servicios heterogéneos de forma unificada e interoperable a través de Internet. Nuevas aplicaciones web son creadas componiendo o combinando servicios web heterogéneos. Desafortunadamente, los desarrollos actuales prestan escasa atención a la reutilización de composiciones de servicios, como mecanismo para facilitar y reducir la complejidad existente a medida que crece el número de servicios web involucrados en una composición.La contribución más importante de esta tesis ha consistido en aportar una aproximación para la composición de servicios web con el fin de facilitar el desarrollo de aplicaciones web basadas en servicios flexibles y reutilizables. Por una parte, la aproximación propuesta introduce el concepto de componente integrado, visto como una unidad básica reutilizable, que integra las características más relevantes sobre reutilización presente en los sistemas basados en componentes software y en el área de los workflows. Por otra parte, esta aproximación describe una metodología de composición para la creación, composición, reutilización de componentes integrados para transformarlos finalmente en procesos ejecutables.

Page generated in 0.035 seconds