Learn More
Mobile devices, specifically smartphones, have become ubiquitous. For this reason, businesses are starting to develop "Bring Your Own Device" policies to allow their employees to use their devices in the workplace. However, due to emerging attacks and limitations in device resources, it is difficult to trust these devices with access to critical proprietary(More)
Popular Open Source Software (OSS) development platforms like GitHub, Google Code, and Bitbucket take advantage of some best practices of traditional software development like version control and issue tracking. Current major open source software environments, including IDE tools and online code repositories, do not provide support for visual architecture(More)
This study proposes a new operational framework of a network administrator for Service Oriented Architecture (SOA) network security. It seeks to characterize the current state of practices in SOA network security by gathering information regarding known threats and defenses for SOA deployments. It works towards the practical implementation of SOA designs by(More)
This paper presents a novel approach to expedite a service discovery process. Since current service discovery approaches do not assume any preprocessing when service providers publish services into a service registry, service composition occurs at discovery time. Also, easily reusing a composed service for future discovery has not been considered. In this(More)
The problem of fnding similar pages to a given web page arises in many web applications such as search engine. In this paper, we focus on the link-based similarity measures which compute web page similarity solely from the hyperlinks of the Web. We first propose a simple model called the Extended Neighborhood Structure (ENS), which defines a bi-directional(More)
e-Health services are gaining popularity due to largely reduced cost and wider range of advanced services. Securing e-Health data transmission is challenging due to both (a) the criticality of personal medical information on effective medical treatment and privacy protection and (b) the significant computational needs of encryption algorithms. In this(More)
This research proposes to modernize a legacy software system by using Web services as the main building blocks of the software reengineering. For this purpose, a legacy theorem proof checking and derivation tool called Bertie3 is reengineered in terms of service-oriented architecture, service-oriented componentization, and external data representation and(More)