Professional Documents
Culture Documents
ABC (Roll No:11 ) in partial fulfillment of the requirements of TE (Computer Engg.) Semester-II For Academic Year 2012-2013
Certificate
This is to certify that following student of TE (Computer Engg), Department of Computer Engineering ABC (Roll No:11 ) has completed the necessary seminar work and prepared the preliminary Seminar Report on
Acknowledgement
I wish to express my sincere gratitude to Prof. C. K. Patil, principal and Prof. H. D. Sonawane, H.O.D of Computer Department for providing me an opportunity for presenting seminar on SOA-based Business Processes. I sincerely thank to my seminar guide Prof. K. S. Kumavat for guidance and encouragement for completing the seminar work. I also wish to express my gratitude to the officials and other staff members who rendered their help during the period of my seminar. Last but not least I wish to avail myself of this opportunity, express a sense of gratitude and love to my friends and my parents for their manual support, strength, help and for everything.
ABC
Abstract
Contents
1 Introduction 1
2 Literature Survey
13 14
4.1 System Analysis and System Flow . . . . . . . . . . . . . . . . . . . . . .16 4.2 System Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 4.2.1. . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . .. . . . . . . . . .. . . . . . . . 20 4.3 Details of Algorithmic Strategy . . . . . . . . . . . . . . . . . . . . . . . . 21 4.4 Advantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22 4.5 Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23 4.6 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24 4.7 Future Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25
5 Conclusion Bibliography
26 27
List of Figures
1.1 aajdsdfjgsdfdjfdkfjdfkjkjfkdgjility Life Cycle . . . . . . . . . . . . . . . . . . . . . . . . 2.1 fgjkjhjkghjkghjgkhjgkWeb Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 ghgkhjgkhjgkhjkghjgkhjgkhjgkh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.3 ghgfhkgjhkgjhjhkgkghjgkhjgkhjlassification . . . . . . . . . . . . . . . . . . . . . . . 2.4 ngjnjghkjhgkjhkjkhjhgkjlh ses with percentage of entries . . . . . . . . . . . . 2.5 Top hjghjkhjkhjkhjklasses with percentage of NVD entries . . . . . . . . . . .
5 6 7
10 11 12
Chapter 1 Introduction
Chapter 2
Chapter 3
Bibliography
[1] Vulnerability Analysis in SOA-based Business Processes Lutz Lowis and Rafael Accorsi, Member IEEE
E-mail: owis,accorsig@iig.uni-freiburg.de .
[2] ATLIST Method: Exploits Vulnerability in SOAV. M. Vasava, Prof. S. P. Abhang (CSE (Soft Engg.), MIT Aurangabad (MS), India)(CSE, MIT Aurangabad (MS), India) IOSR
www.iosrjournals.org
[4] A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE
http://nvd.nist.gov/ , 2009.
[7] Open Security Foundation (OSF), Open Source Vulnerability Database (OSVDB),
http://osvdb.org, 2009.
[8] Department of Defense (DoD), Procedures for performing a failure mode, effects and criticality analysis, MIL-STD-1629A, November 1980