A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2004; you can also visit the original URL.
The file type is application/pdf
.
Filters
Securing Web services
2002
IBM Systems Journal
Is a Web services security layer really required? ...
The Web service security challenge is to understand and assess the risk involved in securing a Web-based service today, based on our existing security technology, and at the same time track emerging standards ...
representation of, some (or all) of a system entity's resources. access control Access control protects resources against unauthorized access; it is a process by which use of resources is regulated according to a security ...
doi:10.1147/sj.412.0228
fatcat:6ahg2i7lk5gajoddzdz7s3ws5e
Securing Web Services
2005
Information Systems Security
Best Practices For Securing Web Services Security has the inherent nature of spanning many different layers of a Web services system. ...
Transport Layer Security The security of the transport that is being used for the Web service can be used to protect the Web service. ...
doi:10.1201/1086.1065898x/45528.14.4.20050901/90087.5
fatcat:3iklf5tyuvavxfyor2f46aytdi
Web services security evaluation considerations
2009
International Journal of Electronic Security and Digital Forensics
Web services development is a key theme in utilisation of the commercial exploitation of the semantic web. ...
The authors attempt to address the issues of security requirements and evaluation criteria, while they discuss the challenges of security implementation through a simple web service application case. ...
Web service-security specifications A set of fundamental and conceptual web service security-oriented standards, namely the web service-security family of specifications, collectively form a web service-centric ...
doi:10.1504/ijesdf.2009.027520
fatcat:fxcxxkiaofeprh6a3e772ytfji
Web services enterprise security architecture
2005
Proceedings of the 2005 workshop on Secure web services - SWS '05
In this article we briefly present the PWSSec (Process for Web Services Security) process that is composed of three stages, WSSecReq (Web Services Security Requirements), WSSecArch (Web Services Security ...
Such a process should facilitate developers in the activities of web service-specific security requirements specification, web services-based security architecture design and web services security standards ...
This web service consumer agent carries out a request/reply interaction with a web service provider agent located at the SportGamblingOrg organization. ...
doi:10.1145/1103022.1103025
dblp:conf/sws/GutierrezFP05
fatcat:ikkiniz54jc7raug4nuvhuxs6q
Towards securing XML Web services
2002
Proceedings of the 2002 ACM workshop on XML security - XMLSEC '02
Preview: Mastering Web Services Security
2005
Zenodo
This presentation gives an overview of the upcoming book on Mastering Web Services Security that I co-authored with my colleagues at Quadrasis. ...
Security Mechanisms for
(ASP).NET Web Services
Security Mechanisms for
(ASP).NET Web Services
Options for Building MS WS
Options for Building MS WS
1. ...
Framework
Security Facilities
Active
Directory
Service
WS-Security/
SAML
Service
Security APIs
Custom Self-Registration
Web SSO, SAML Service
ASP.NET, COM+
Firewall
Intrusion Detection ...
doi:10.5281/zenodo.3264180
fatcat:upt2dyrujre5telm6u57z2ayt4
XML and web services security
2008
2008 12th International Conference on Computer Supported Cooperative Work in Design
In this paper, we present XML and Web service security main standards and most specifications for these standards. ...
Therefore, securing XML data is becoming important. Several specifications progressed toward providing a comprehensive standards framework for securing XML-based application have been presented. ...
It can provide a secure framework to XML web services. ...
doi:10.1109/cscwd.2008.4537075
dblp:conf/cscwd/SunL08
fatcat:fhw5sjqaqbhhlhricxcg4gstjm
A Web Service Secure Model
2005
2005 First International Conference on Semantics, Knowledge and Grid
In this paper, we propose a Web service secure model based on XKMS and SAML to assure the secure transport of SOAP message at application layer, ...
Conclusion The proposed Web service secure model based on XKMS and SAML can ensure secure communication and authentication in some way. Fig. 1 1 Web Service secure model based on XKMS and SAML. ...
A Web Service Secure Model As shown in the figure, a client registers its key with XKMS service through the PKI to store and bind the keys with identification information. ...
doi:10.1109/skg.2005.29
dblp:conf/skg/ZhuangYR05
fatcat:plb4mtyebfh7tk5eyr3s4epgiy
Web Service Security — XKMS (TrustPoint)
[chapter]
2004
ISSE 2004 — Securing Electronic Business Processes
Der richtige und langfristige Weg Web Services abzusichern, ist die Nutzung einer PKI. ...
Web Services müssen sicher werden, um schützenswerte Daten angemessen übertragen zu können. ...
Basierend auf den Verfahren und Mechanismen von PKIX und Web Services Security besteht nun die Möglichkeit, dass Anwendungen im Rahmen von Geschäftsprozessen die Vorteile von zertifikatsbasierender Security ...
doi:10.1007/978-3-322-84984-7_25
dblp:conf/isse/BaerPP04
fatcat:apydt3cqbvhunlj2okjtuwpqym
Secure sessions for Web services
2007
ACM Transactions on Privacy and Security
For typical web services, however, using WS-Security independently for each message is rather inefficient; besides, it is often important to secure the integrity of a whole session, as well as each message ...
WS-Security provides basic means to secure SOAP traffic, one envelope at a time. ...
Background: Web Services Security. Web services are built on asynchronous communication of SOAP envelopes [29] . ...
doi:10.1145/1237500.1237504
fatcat:mpskeda2pzdarez36mjndkqjwi
Secure sessions for web services
2004
Proceedings of the 2004 workshop on Secure web service - SWS '04
For typical web services, however, using WS-Security independently for each message is rather inefficient; besides, it is often important to secure the integrity of a whole session, as well as each message ...
WS-Security provides basic means to secure SOAP traffic, one envelope at a time. ...
Background: Web Services Security. Web services are built on asynchronous communication of SOAP envelopes [29] . ...
doi:10.1145/1111348.1111355
dblp:conf/sws/BhargavanCFG04
fatcat:bwd25p2o5nbvflwwtnhkbd4bde
Security Conscious Web Service Composition
2006
2006 IEEE International Conference on Web Services (ICWS'06)
We propose a method for modeling security constraints and a brokered architecture to build composite Web services according to the specified security constraints. ...
In this paper, we focus on security constraints of Web service composition, which have not been deeply investigated so far. ...
Secure WS-broker Secure conscious composition of Web services is realized by a Web service, called Secure WS-Broker (SWS-Broker for short). ...
doi:10.1109/icws.2006.115
dblp:conf/icws/CarminatiFH06
fatcat:dsoufghnhjfa5jruokud26avjq
Custom Security in Web Services
2016
Indian Journal of Science and Technology
Background/Objectives: Service oriented Architecture (SOA) infrastructures using web services are deployed by many firms worldwide. ...
The greatest web security threat is accepting the request from the client without proper validation. ...
Introduction Web services may expose business critical systems and information and hence a proper security should be applied to it. ...
doi:10.17485/ijst/2016/v9i29/91685
fatcat:t6gh4mgg3zefxo37455wbr6qxq
Towards securing XML Web services
2002
Proceedings of the 2002 ACM workshop on XML security -
Middleware and Web Services Security
2005
Zenodo
We will discuss the functionalities and capabilities of the security mechanisms of today middleware and web services technologies, such as EJB, COM+, and ASP.NET, that allow addressing these challenges ...
Challenges of designing secure distributed applications are due to distribution, scale and object orientation. ...
• Part II: Middleware and Web services
-What are middleware and Web services?
-What's special about middleware and Web services security? ...
doi:10.5281/zenodo.3264162
fatcat:jqnnoyfzwjhu5etq4nby25pmni
« Previous
Showing results 1 — 15 out of 410,396 results