DOI: 10.1007/978-3-540-85567-5_96
|View full text |Cite
|
Sign up to set email alerts
|

Integrating Web Services and Intelligent Agents in Supply Chain for Securing Sensitive Messages

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 5 publications
0
8
0
Order By: Relevance
“…Architectural research examines frameworks for the deployment of operational information security processes and technical implementations. We identified a small number of papers in this area (Djordjevic et al , 2007; Fabian et al , 2013; Moradian, 2008; Wangwe et al , 2012; Eigeles, 2006). For example, Wangwe et al (2012) developed a framework for collaboration between government agencies.…”
Section: Resultsmentioning
confidence: 99%
“…Architectural research examines frameworks for the deployment of operational information security processes and technical implementations. We identified a small number of papers in this area (Djordjevic et al , 2007; Fabian et al , 2013; Moradian, 2008; Wangwe et al , 2012; Eigeles, 2006). For example, Wangwe et al (2012) developed a framework for collaboration between government agencies.…”
Section: Resultsmentioning
confidence: 99%
“…In this step we carry out data integration by using web service to achieve secret message through sender and receiver in which architecture is oriented in doing service producing different solution in business logic with various application [15].Web service technology combines the message sent through WhatsApp (WA) web to be disguised. The model of architecture in the web service is shown in Figure 8:…”
Section: Integration With Web Service Modelmentioning
confidence: 99%
“…Chatting model done individually or in the group does not have any security guarantee to the receiver, yet the plaintext sent through operator server is fragile of hacker attack [10], [11]. Plaintext and plainimage saved in the operator server can be a weakness of the application users who feel secure but in fact there are many hacker attacks achieving textual information saved in the server [13]- [15], so an additional network control software is needed [16].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In different approaches integration of intelligent agents and Web-services has been applied for various purposes. E.g., it was a basis for distributed service discovery and negotiation system in B2B [13]; in [14] a way to protect secret business information from being disclosed, modified and lost is described. In the approach presented in this paper agents "activate" Web-services when required and make Web-service descriptions sharable via using ontology.…”
Section: Introductionmentioning
confidence: 99%