License: Creative Commons Attribution 4.0 International license (CC BY 4.0)
When quoting this document, please refer to the following
DOI: 10.4230/DagSemProc.08102.7
URN: urn:nbn:de:0030-drops-14982
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2008/1498/
Go to the corresponding Portal |
Daciér, Marc ;
Flegel, Ulrich ;
Holz, Ralph ;
Luttenberger, Norbert
7. 08102 Working Group -- Intrusion and Fraud Detection for Web Services
Abstract
Web services (WS) technology bears the promise to finally bring the power of SOA middleware to the road on a large scale and across organizational domains. Big players such as Google, Amazon, SAP, and IBM have already adopted the technol-ogy. European funding agencies are strongly believing and heavily investing into WS-related technological developments and application scenarios. We expect a growing adoption and widespread use of Web services for different application areas, among them e.g. value added service composition, Web 2.0-enhanced communication sys-tems (e.g. based on Ajax), and focused service offerings from specialized small or medium sized enterprises (SMEs).
BibTeX - Entry
@InProceedings{dacier_et_al:DagSemProc.08102.7,
author = {Daci\'{e}r, Marc and Flegel, Ulrich and Holz, Ralph and Luttenberger, Norbert},
title = {{7. 08102 Working Group – Intrusion and Fraud Detection for Web Services}},
booktitle = {Perspectives Workshop: Network Attack Detection and Defense},
pages = {1--3},
series = {Dagstuhl Seminar Proceedings (DagSemProc)},
ISSN = {1862-4405},
year = {2008},
volume = {8102},
editor = {Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K\"{o}nig and Christopher Kruegel},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/opus/volltexte/2008/1498},
URN = {urn:nbn:de:0030-drops-14982},
doi = {10.4230/DagSemProc.08102.7},
annote = {Keywords: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma network monitoring, flow analysis, denial of service detection and response, event correlation}
}
Keywords: |
|
Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma |
Freie Schlagwörter (deutsch): |
|
network monitoring, flow analysis, denial of service detection and response, event correlation |
Collection: |
|
08102 - Perspectives Workshop: Network Attack Detection and Defense |
Issue Date: |
|
2008 |
Date of publication: |
|
20.05.2008 |