[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Shahgholi et al., 2011 - Google Patents

A new SOA security framework defending web services against WSDL attacks

Shahgholi et al., 2011

View PDF
Document ID
6378318410751254728
Author
Shahgholi N
Mohsenzadeh M
Seyyedi M
Qorani S
Publication year
Publication venue
2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing

External Links

Snippet

Service Oriented Architecture is an architectural paradigm and discipline that may be used to build infrastructures enabling those with needs (consumers) and those with capabilities (providers) to interact via services across disparate domains of technology and ownership …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2135Metering

Similar Documents

Publication Publication Date Title
US10432394B2 (en) Method and system for sharing encrypted content
Nuñez et al. BlindIdM: A privacy-preserving approach for identity management as a service
JP2012518329A (en) A framework for trusted cloud computing and services
Guo et al. Using blockchain to control access to cloud data
Shahgholi et al. A new SOA security framework defending web services against WSDL attacks
Mirtalebi et al. Enhancing security of Web service against WSDL threats
Kumar Cryptography during data sharing and accessing over cloud
Lou et al. Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system
Gowda et al. Blockchain-based access control model with privacy preservation in a fog computing environment
Chaurasia et al. Authentication in cloud computing environment using two factor authentication
WO2015079004A1 (en) Method and apparatus for supporting verification of a contract
Pervez et al. Oblivious access control policies for cloud based data sharing systems
Shahgholi et al. A new security framework against Web services' XML attacks in SOA
Wadhwa et al. Framework for user authenticity and access control security over a cloud
Piechotta et al. A secure dynamic collaboration environment in a cloud context
Yue-Sheng et al. Web services security based on XML signature and XML encryption
Wong et al. An architecture for trustworthy open data services
Gilda et al. None Shall Pass: A blockchain-based federated identity management system
Mirtalebi et al. A cryptography approach on security layer of web service
Dharamadhikari et al. Public auditing schemes (pas) for dynamic data in cloud: A review
El-Sofany et al. Studying Security of Data in Cloud Computing Through Cryptographic Approach
Alharbi et al. A Blockchain Review: A Comparative Study Between Public Key Infrastructure and Identity Based Encryption
Sultan et al. Overcoming Barriers to Client-Side Digital Certificate Adoption
Vanamoorthy Secure Data Sharing Using Revocable-Storage Identity-Based Encryption
Sharma et al. Survey on Cloud Computing Security Policies and Privacy Concerns for Information Security.