Shahgholi et al., 2011 - Google Patents
A new SOA security framework defending web services against WSDL attacksShahgholi et al., 2011
View PDF- Document ID
- 6378318410751254728
- Author
- Shahgholi N
- Mohsenzadeh M
- Seyyedi M
- Qorani S
- Publication year
- Publication venue
- 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing
External Links
Snippet
Service Oriented Architecture is an architectural paradigm and discipline that may be used to build infrastructures enabling those with needs (consumers) and those with capabilities (providers) to interact via services across disparate domains of technology and ownership …
- 241000687904 Soa 0 title abstract description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2135—Metering
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10432394B2 (en) | Method and system for sharing encrypted content | |
Nuñez et al. | BlindIdM: A privacy-preserving approach for identity management as a service | |
JP2012518329A (en) | A framework for trusted cloud computing and services | |
Guo et al. | Using blockchain to control access to cloud data | |
Shahgholi et al. | A new SOA security framework defending web services against WSDL attacks | |
Mirtalebi et al. | Enhancing security of Web service against WSDL threats | |
Kumar | Cryptography during data sharing and accessing over cloud | |
Lou et al. | Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system | |
Gowda et al. | Blockchain-based access control model with privacy preservation in a fog computing environment | |
Chaurasia et al. | Authentication in cloud computing environment using two factor authentication | |
WO2015079004A1 (en) | Method and apparatus for supporting verification of a contract | |
Pervez et al. | Oblivious access control policies for cloud based data sharing systems | |
Shahgholi et al. | A new security framework against Web services' XML attacks in SOA | |
Wadhwa et al. | Framework for user authenticity and access control security over a cloud | |
Piechotta et al. | A secure dynamic collaboration environment in a cloud context | |
Yue-Sheng et al. | Web services security based on XML signature and XML encryption | |
Wong et al. | An architecture for trustworthy open data services | |
Gilda et al. | None Shall Pass: A blockchain-based federated identity management system | |
Mirtalebi et al. | A cryptography approach on security layer of web service | |
Dharamadhikari et al. | Public auditing schemes (pas) for dynamic data in cloud: A review | |
El-Sofany et al. | Studying Security of Data in Cloud Computing Through Cryptographic Approach | |
Alharbi et al. | A Blockchain Review: A Comparative Study Between Public Key Infrastructure and Identity Based Encryption | |
Sultan et al. | Overcoming Barriers to Client-Side Digital Certificate Adoption | |
Vanamoorthy | Secure Data Sharing Using Revocable-Storage Identity-Based Encryption | |
Sharma et al. | Survey on Cloud Computing Security Policies and Privacy Concerns for Information Security. |