[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Perišić et al., 2019 - Google Patents

Security Issues in Applying Web Services within Business Applications: a Case Study

Perišić et al., 2019

View PDF
Document ID
13590887000789937261
Author
Perišić L
Kazi L
Gecin G
Publication year
Publication venue
APPLIED INTERNET AND INFORMATION TECHNOLOGIES

External Links

Snippet

This paper describes the application of security aspects of web services within business applications. Like any software or web application, web services are also prone to security threats related to authentication, availability and integrity, so that new techniques and …
Continue reading at research.tilburguniversity.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority

Similar Documents

Publication Publication Date Title
US10333941B2 (en) Secure identity federation for non-federated systems
US7346923B2 (en) Federated identity management within a distributed portal server
KR101063368B1 (en) Manage digital rights management (DRM) enforcement policy for identity providers in a federated environment
KR101054700B1 (en) Manage digital rights management (DRM) enforcement policy for service providers in a federated environment
US7647627B2 (en) System and methods for secure service oriented architectures
Singhal et al. Guide to secure web services
US8291466B2 (en) Method and system for synchronized policy control in a web services environment
US20090125972A1 (en) Federated single sign-on (f-sso) request processing using a trust chain having a custom module
Muthukrishnan et al. Technical analysis on security realization in web services for e-business management
Perišić et al. Security Issues in Applying Web Services within Business Applications: a Case Study
Al-Shargabi Security engineering for E-government web services: A trust model
Balasubramanian et al. Security: a major threat for web services
Sabbari et al. Improving attribute based access control model for web services
Cherrueau et al. Reference monitors for security and interoperability in OAuth 2.0
Priyadharshini et al. A framework for securing web services by formulating an collaborative security standard among prevailing WS-* security standards
Khoo et al. Managing Web services security
O'Ree et al. Security enhancements for UDDI
Meduri Webservice security
Dumitra et al. Securing Web Services using Service Token Security
Shin Web services
Ibrahim et al. Constructing Solutions to SOA Attacks on SOAP Web services-A Literature Review
Chandersekaran et al. Enterprise delegation for service based systems
Kogan Web services security-focus on SAML and XACML
Sharma et al. Web Services and Interoperability: Security Challenges
Hanrahan Analysis of Windows Cardspace Identity Management System