Web and Information Technologies
Sign up for access to the world's latest research
Abstract
Welcome to the fourth edition of the International Conference on Web and Information technologies, ICWIT 2012. This year the ICWIT conference continued the tradition that has evolved from the inaugural conference held in 2008 in Sidi Bel-Abbes and since then has made its journey around the Maghreb: 2009 Sfax (Tunisia) and 2010 Marrakech (Morocco). This year we were happy to hold the event in Sidi Bel-Abbes, a city of 300,000 inhabitants in western Algeria. Sidi Bel-Abbes's geographical location has predestined the city to be a significant scientific, cultural and economic center with more than just regional influence. The ICWIT 2012 Conference provided a forum for research community and industry practitioners to present their latest findings in theoretical foundations current methodologies and practical experiences. ICWIT 2012 will focus on new research directions and emerging applications in Web and Information Technologies. The submitted contributions address challenging issues of Web Technologies, Web Security, Information Systems, Ontology Engineering and Wireless Communications.
Related papers
WEB 2013 Foreword The First International Conference on Building and Exploring Web Based Environments [WEB 2013], held between January 27th-February 1st, 2013 in Seville, Spain, was the inaugural conference on web-related theoretical and practical aspects, focusing on identifying challenges for building web-based useful services and applications, and for effectively extracting and integrating knowledge from the Web, enterprise data, and social media. The Web has changed the way we share knowledge, the way we design distributed services and applications, the way we access large volumes of data, and the way we position ourselves with our peers. Successful exploitation of web-based concepts by web communities lies on the integration of traditional data management techniques and semantic information into web-based frameworks and systems. We take here the opportunity to warmly thank all the members of the WEB 2013 Technical Program Committee, as well as the numerous reviewers. The creati...
a series of events focusing on web-related theoretical and practical aspects, identifying challenges for building web-based useful services and applications, and effectively extracting and integrating knowledge from the Web, enterprise data, and social media. The Web has changed the way we share knowledge, the way we design distributed services and applications, the way we access large volumes of data, and the way we position ourselves with our peers. Successful exploitation of web-based concepts by web communities lies on the integration of traditional data management techniques and semantic information into web-based frameworks and systems. The conference had the following tracks: Services and applications Features We take here the opportunity to warmly thank all the members of the WEB 2015 technical program committee, as well as the numerous reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly...
1997
Abstract We outline the Web technologies and the related threats within the framework of a Web threat environment. We also examine the issue surrounding dowloadable executable content and present a number of security services that can be used for Web transactions categorised according to the Internet layering model.
One of the main purposes of this thesis is to explain technologies and applications of Web 2.0; introducing Web 2.0 and comparing it to Web 1.0; explaining how existing technologies of Web 1.0 such as CSS, XML and JavaScript combined could create more interactive content for websites. Technologies such as Adobe Flex and Microsoft Silverlight could be used to create operation system and browser independent web application with advanced graphic interface. By explaining advantages, disadvantages and dangers of Web 2.0 technologies and applications, this thesis intends to benefit IT professionals, political, academic and business interest, which profit from the use of these technologies in their professional endeavors. Research has been influenced by my personal, long lasting experience of using Web 2.0 technologies during my professional and academic undertakings. In addition topic-related secondary literature has also been applied in understanding and explaining applications, technologies and security issues. This study will also deal with the openness and the way of managing online content in Web 2.0 which has increased users' participation online. Most popular of such Web 2.0 applications are Wikis, blogs and podcasts. The thesis will introduce sociable technologies of Web 2.0 such as social networking services, social bookmarking, folksonomies, file sharing and tagging, mashups, social search engines, instant messaging and collaborative filtering. In addition, the chapter number three will overview security related issues and problems of Web 2.0. Moreover, the applicability of Web 2.0 technologies in business and marketing use is described. We will also see how the "long tale" theory has manifested itself through Web 2.0 technology.
There are millions of websites in the world now but it has been observed since very long time that Web Security has been one of most important areas of research whether be it either analysis or detection and later developing to mitigation plans. Web security threats are very much present now days and they have undergone much sophistication comparing to their initial phase. Now they are becoming more & more evolved each day. The evolution of threat on websites might be in terms of new ways of attack or bringing in resistance to using simulated Operating Systems or VM ware environments. Also, there has been considerable shift in the target of attacks in recent years. Earlier, clients were ignored while choosing targets. But, in recent years client user has become the main target for attacks as the adversary believe that the end user is the weakest link in the security chain. This paper is presented here to study the issues related to web security in cyber world.
Computer, 2003
Schnurr et al., …, 2001
E-government is a way for governments to use the new technologies to provide citizens, businesses, and government agencies with more convenient access to government information and services, to improve the quality of the services and to provide greater opportunities to participate in democratic institutions and processes. The Webocrat System which will be designed and implemented within the Webocracy project is an example of innovative use of Web technologies in order to support direct participation in democratic processes. The Webocrat system can be seen as an e-government system, focusing on the following functions: discussion, publishing on the Web, limited public procurement on the Internet, opinion polling, statistics functions, retrieval of information, and knowledge management. In general, it is essential for e-government that information and services are adequately protected and that citizens privacy maintained. A level of confidence and trust among all users (citizen, business, government) will become the foundation of a successful e-government initiative like Webocracy. This trust will be acquired through the development and implementation of appropriate security protection mechanisms, provided by the security desk which is an integral part of the Webocrat system.
The Web is entering a new phase of evolution.
IFIP Workshop on Database Security, 1998
IEEE Software, 2015
FOCUS: GUEST EDITORS' INTRODUCTION OVER THE PAST few decades, software developed for the Web has become more intricate, requiring knowledge of and the use of multiple moving partsthat is, dynamic software development and deployment stacks. At the same time, Web software is becoming more integral to the human experience. For most of us, our online personas and real identities are tightly integrated. Online systems augment and connect with physical systems to transform and accelerate prior analog-only mechanisms. Mission-critical assets of corporations, infrastructure providers, governments, and average citizens rely more than ever on Web software. So, they're more exposed to attack through software vulnerabilities and flaws. This makes the creation of secure, privacy-preserving Web software essential to our future. Web software, its supporting stack, and the Web softwareengineering process must all have security and privacy mitigations integrated into them.

Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.