Assessing computer security vulnerability
ACM SIGOPS Operating Systems Review
New paradigms in incident management
Proceedings of the 2000 workshop on New security paradigms
A Flexible Containment Mechanism for Executing Untrusted Code
Proceedings of the 11th USENIX Security Symposium
Managing vulnerabilities of information systems to security incidents
ICEC '03 Proceedings of the 5th international conference on Electronic commerce
Hi-index | 0.00 |
Web services are considered to be a major challenge for the information technology industry as they emerge from integration of several technologies adaptable within different architectures and platforms. Web Services are deployed within heterogeneous distributed environments; specifically B-2-B interactions are considered to be critical-mission activities for all parties involved, the main goals of these services is to provide a secured inter-organizational computing environment. We deploy web services on the web for the purpose of achieving reusability, interoperability, and standards utilizations. Web services are based on interactions of peers where loosely coupled systems interact in anonymous computing environments. WS environments are considered to be more vulnerable to faults and incidents than tightly coupled services. In this paper; we introduce a token-based methodology that is utilized for the purpose of quality assurance of the services computing environments. We introduce the Asynchronous Computing Environment Profile Unification Methodology (ACEPUM) to be used a vulnerability reduction methodology which to audit the environment profile variables. This approach utilizes the idea of reducing surface of attacks by limiting number of active resources within the environment.