Developing a decision-making framework for web service security profiles: a design-science paradigm
Proceedings of the 1st International Conference on Intelligent Semantic Web-Services and Applications
Study on role-based access control model for web services and its application
TELE-INFO'06 Proceedings of the 5th WSEAS international conference on Telecommunications and informatics
CSCWD'05 Proceedings of the 9th international conference on Computer Supported Cooperative Work in Design II
Security frameworks for open LBS based on web services security mechanism
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Open location-based service using secure middleware infrastructure in web services
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
XML-Based digital signature accelerator in open mobile grid computing
GCC'05 Proceedings of the 4th international conference on Grid and Cooperative Computing
XML-signcryption based LBS security protocol acceleration methods in mobile distributed computing
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
XML-based security acceleration methods supporting fast mobile grid
EC-Web'05 Proceedings of the 6th international conference on E-Commerce and Web Technologies
A security acceleration using XML signcryption scheme in mobile grid web services
ICWE'05 Proceedings of the 5th international conference on Web Engineering
XKMS-Based key management for open LBS in web services environment
AWIC'05 Proceedings of the Third international conference on Advances in Web Intelligence
Hi-index | 0.00 |
Web services are applications that can be accessed via widely accepted standards such as HTTP and XML. Since they are based on message exchanges on the Internet, there are always security risks as messages could be stolen, lost, or modified. Fortunately there are security standards such as SSL, and emerging standards such as XML digital signatures. With these technologies, safe information exchange among trading partners can be ensured. On the other hand, there exist security architectures within enterprise environments that are recipient of the incoming messages. Therefore, we must concern how the security information accompanying incoming messages should be processed there. In this paper, we review security information items coming with SOAP (Simple Object Accessing Protocol) messages, and discuss how each item can be processed by constructs in enterprise systems. In our analysis, we consider alternate mappings, and evaluate their advan-tages in terms of performance and manageability.