Fuzzy description of security requirements for intrusion tolerant web-services
Performing security analysis in the early stages of web-services development is a major engineering trend. However, it is not always possible to entirely identify and mitigate the security threats within the web-service. This may eventually lead to security failure of the service. To avoid secu...
| Main Authors: | Mougouei, Davoud, Wan Ab. Rahman, Wan Nurhayati |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
The Society of Digital Information and Wireless Communications (SDIWC)
2013
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/41333/ http://psasir.upm.edu.my/id/eprint/41333/1/41333.pdf |
Similar Items
A fuzzy-based technique for describing security requirements of intrusion tolerant systems
by: Mougouei, Davoud, et al.
Published: (2013)
by: Mougouei, Davoud, et al.
Published: (2013)
Evaluating fault tolerance in security requirements of web services.
by: Mougouei, Davoud, et al.
Published: (2012)
by: Mougouei, Davoud, et al.
Published: (2012)
A goal-based modeling approach to develop security requirements of fault tolerant security-critical systems
by: Mougouei, Davoud, et al.
Published: (2012)
by: Mougouei, Davoud, et al.
Published: (2012)
S-Scrum: a secure methodology for agile development of web services
by: Mougouei, Davoud, et al.
Published: (2013)
by: Mougouei, Davoud, et al.
Published: (2013)
Towards a secure and available smart grid using intrusion tolerance.
by: Tanha, Maryam, et al.
Published: (2012)
by: Tanha, Maryam, et al.
Published: (2012)
Intrusion detection and prevention of web service attacks for software as a service:Fuzzy association rules vs fuzzy associative patterns
by: Chan, Gaik Yee, et al.
Published: (2016)
by: Chan, Gaik Yee, et al.
Published: (2016)
Concepts and derivatives of web services
by: Khanjani, Atieh, et al.
Published: (2013)
by: Khanjani, Atieh, et al.
Published: (2013)
An intrusion tolerant system architecture for secure and self-healing smart grid control centers
by: Tanha, Maryam
Published: (2013)
by: Tanha, Maryam
Published: (2013)
A generic QoS model for web: services design
by: Wan Ab. Rahman, Wan Nurhayati, et al.
Published: (2011)
by: Wan Ab. Rahman, Wan Nurhayati, et al.
Published: (2011)
A generic QoS model for web services design.
by: Wan Ab. Rahman, Wan Nurhayati, et al.
Published: (2012)
by: Wan Ab. Rahman, Wan Nurhayati, et al.
Published: (2012)
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
by: Shahid, Anwar, et al.
Published: (2017)
by: Shahid, Anwar, et al.
Published: (2017)
Improving security requirements adequacy: an interval type 2 fuzzy logic security assessment system
by: Hibshi, Hanan, et al.
Published: (2016)
by: Hibshi, Hanan, et al.
Published: (2016)
A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework
by: Udzir, Nur Izura, et al.
Published: (2019)
by: Udzir, Nur Izura, et al.
Published: (2019)
An intrusion tolerant system for improving availability in smart grid control centers.
by: Tanha, Maryam, et al.
Published: (2012)
by: Tanha, Maryam, et al.
Published: (2012)
Collaborative Security Mechanism in Detecting Intrusion Activity
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Intrusion detection security system with IOT sensors
by: Chean, Vernon Lynn Chii
Published: (2021)
by: Chean, Vernon Lynn Chii
Published: (2021)
A Descriptive Study Of 39 Malaysian Web Sites
by: Abdul Rahman, Dr Mohamed Rafick Khan
Published: (2000)
by: Abdul Rahman, Dr Mohamed Rafick Khan
Published: (2000)
A classification of semantic conflicts in heterogeneous Web services at message level
by: Al-Baltah, Ibrahim Ahmed, et al.
Published: (2016)
by: Al-Baltah, Ibrahim Ahmed, et al.
Published: (2016)
Semantic conflicts detection of heterogeneous messages of Web services: challenges and solution
by: Al-Baltah, Ibrahim Ahmed, et al.
Published: (2014)
by: Al-Baltah, Ibrahim Ahmed, et al.
Published: (2014)
Eyebrow semantic description via clustering based on Axiomatic Fuzzy Set
by: Li, D., et al.
Published: (2018)
by: Li, D., et al.
Published: (2018)
Semantic facial description via axiomatic Fuzzy Set based clustering
by: Li, Q., et al.
Published: (2016)
by: Li, Q., et al.
Published: (2016)
Cloud intrusion detection systems: fuzzy logic and classifications
by: Alqahtani, Saeed Masaud H.
Published: (2017)
by: Alqahtani, Saeed Masaud H.
Published: (2017)
A generic framework for e-commerce requirements to comply with Sharia in business-to-consumer perspective
by: Ribadu, Mohammed Bashir, et al.
Published: (2016)
by: Ribadu, Mohammed Bashir, et al.
Published: (2016)
Embryonic Development and Nutritional Requirements of Kutum Fry, Rutilus Frisii Kutum
by: Haghighi, Davoud Talebi
Published: (2006)
by: Haghighi, Davoud Talebi
Published: (2006)
Anomaly-based intrusion detection using fuzzy rough clustering
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Hybrid Biological Intrusion Prevention and Selfhealing System for Network Security
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Biological Intrusion Prevention and Self-Healing Model for Network Security
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Intrusion detection system in secure shell traffic in cloud environment
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
Intrusion Alert Quality Framework For
Security False Alert Reduction
by: Abu Bakar, Najwa
Published: (2007)
by: Abu Bakar, Najwa
Published: (2007)
A fault-intrusion-tolerant system and deadline-aware algorithm for scheduling scientific workflow in the cloud
by: Farid, Mazen, et al.
Published: (2021)
by: Farid, Mazen, et al.
Published: (2021)
An analysis of knowledge sharing behaviors in requirement engineering through social media
by: Wu, Liming, et al.
Published: (2015)
by: Wu, Liming, et al.
Published: (2015)
Food security requires national leadership
by: Yeong, Sheng Tey
Published: (2023)
by: Yeong, Sheng Tey
Published: (2023)
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013)
by: Hui, K., et al.
Published: (2013)
Security of multimedia in the web
by: Zeki, Akram M.
Published: (2011)
by: Zeki, Akram M.
Published: (2011)
A comparative study on ontology development methodologies towards building semantic conflicts detection ontology for heterogeneous web services
by: Al-Baltah, Ibrahim Ahmed, et al.
Published: (2014)
by: Al-Baltah, Ibrahim Ahmed, et al.
Published: (2014)
Bio Inspired Intrusion Prevention and Self-healing Architecture for Network Security
by: Muna , Elsadig, et al.
by: Muna , Elsadig, et al.
The use of intrusion prevention system to increase computer security / Najib Limun
by: Limun, Najib
Published: (2005)
by: Limun, Najib
Published: (2005)
Detection model for ambiguous intrusion using SMOTE and LSTM for Network Security
by: Khalaf, Al-Ogaidi Ali Hameed, et al.
Published: (2024)
by: Khalaf, Al-Ogaidi Ali Hameed, et al.
Published: (2024)
Two level security approaches for secure XML database centric web services against xpath injections
by: Asmawi, Aziah
Published: (2016)
by: Asmawi, Aziah
Published: (2016)
Exploring functional and non-functional requirements of social media on knowledge sharing
by: Wu, Liming, et al.
Published: (2016)
by: Wu, Liming, et al.
Published: (2016)
Similar Items
-
A fuzzy-based technique for describing security requirements of intrusion tolerant systems
by: Mougouei, Davoud, et al.
Published: (2013) -
Evaluating fault tolerance in security requirements of web services.
by: Mougouei, Davoud, et al.
Published: (2012) -
A goal-based modeling approach to develop security requirements of fault tolerant security-critical systems
by: Mougouei, Davoud, et al.
Published: (2012) -
S-Scrum: a secure methodology for agile development of web services
by: Mougouei, Davoud, et al.
Published: (2013) -
Towards a secure and available smart grid using intrusion tolerance.
by: Tanha, Maryam, et al.
Published: (2012)