Perišić et al., 2019 - Google Patents
Security Issues in Applying Web Services within Business Applications: a Case StudyPerišić et al., 2019
View PDF- Document ID
- 13590887000789937261
- Author
- Perišić L
- Kazi L
- Gecin G
- Publication year
- Publication venue
- APPLIED INTERNET AND INFORMATION TECHNOLOGIES
External Links
Snippet
This paper describes the application of security aspects of web services within business applications. Like any software or web application, web services are also prone to security threats related to authentication, availability and integrity, so that new techniques and …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10333941B2 (en) | Secure identity federation for non-federated systems | |
US7346923B2 (en) | Federated identity management within a distributed portal server | |
KR101063368B1 (en) | Manage digital rights management (DRM) enforcement policy for identity providers in a federated environment | |
KR101054700B1 (en) | Manage digital rights management (DRM) enforcement policy for service providers in a federated environment | |
US7647627B2 (en) | System and methods for secure service oriented architectures | |
Singhal et al. | Guide to secure web services | |
US8291466B2 (en) | Method and system for synchronized policy control in a web services environment | |
US20090125972A1 (en) | Federated single sign-on (f-sso) request processing using a trust chain having a custom module | |
Muthukrishnan et al. | Technical analysis on security realization in web services for e-business management | |
Perišić et al. | Security Issues in Applying Web Services within Business Applications: a Case Study | |
Al-Shargabi | Security engineering for E-government web services: A trust model | |
Balasubramanian et al. | Security: a major threat for web services | |
Sabbari et al. | Improving attribute based access control model for web services | |
Cherrueau et al. | Reference monitors for security and interoperability in OAuth 2.0 | |
Priyadharshini et al. | A framework for securing web services by formulating an collaborative security standard among prevailing WS-* security standards | |
Khoo et al. | Managing Web services security | |
O'Ree et al. | Security enhancements for UDDI | |
Meduri | Webservice security | |
Dumitra et al. | Securing Web Services using Service Token Security | |
Shin | Web services | |
Ibrahim et al. | Constructing Solutions to SOA Attacks on SOAP Web services-A Literature Review | |
Chandersekaran et al. | Enterprise delegation for service based systems | |
Kogan | Web services security-focus on SAML and XACML | |
Sharma et al. | Web Services and Interoperability: Security Challenges | |
Hanrahan | Analysis of Windows Cardspace Identity Management System |