[go: up one dir, main page]

Priyadharshini et al., 2011 - Google Patents

A framework for securing web services by formulating an collaborative security standard among prevailing WS-* security standards

Priyadharshini et al., 2011

View PDF
Document ID
14642488723915629527
Author
Priyadharshini M
Baskaran R
Srinivasan M
Rodrigues P
Publication year
Publication venue
International Conference on Advances in Computing and Communications

External Links

Snippet

Web Services enables communication between applications with a less working out on the underlying mechanics of communication. This paper provides a brief introduction to security concepts and describes in detail various specifications related to security among WS …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/02Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP]
    • H04L67/025Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP] for remote control or remote monitoring of the application
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/28Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
    • H04L67/2823Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network for conversion or adaptation of application content or format

Similar Documents

Publication Publication Date Title
Lorch et al. First experiences using XACML for access control in distributed systems
US8151317B2 (en) Method and system for policy-based initiation of federation management
US8141139B2 (en) Federated single sign-on (F-SSO) request processing using a trust chain having a custom module
Singhal et al. Guide to secure web services
US9450946B2 (en) Secure identity federation for non-federated systems
KR101063368B1 (en) Manage digital rights management (DRM) enforcement policy for identity providers in a federated environment
KR101054700B1 (en) Manage digital rights management (DRM) enforcement policy for service providers in a federated environment
Bhatti et al. An integrated approach to federated identity and privilege management in open systems
Shin et al. Ensuring information assurance in federated identity management
Li et al. Access control for the services oriented architecture
Geuer-Pollmann et al. Web services and web service security standards
Karp et al. Solving the transitive access problem for the services oriented architecture
Ahn et al. User-centric privacy management for federated identity management
Priyadharshini et al. A framework for securing web services by formulating an collaborative security standard among prevailing WS-* security standards
Pfitzmann Privacy in enterprise identity federation–policies for Liberty 2 single sign on
Saadaoui et al. Web services policy generation based on SLA requirements
Muthukrishnan et al. Technical analysis on security realization in web services for e-business management
Ardagna et al. XML security
Namlı et al. Implementation experiences on ihe xua and bppc
Ma et al. Authentication delegation for subscription-based remote network services
De Mello et al. A model for authentication credentials translation in service oriented architecture
Hakobyan Authentication and authorization systems in cloud environments
Singhal et al. SP 800-95. Guide to Secure Web Services
Stefas Decentralized authorization for web services
Perišić et al. Security Issues in Applying Web Services within Business Applications: a Case Study