Sinha et al., 2008 - Google Patents
A formal solution to rewriting attacks on SOAP messagesSinha et al., 2008
- Document ID
- 15269207258691953941
- Author
- Sinha S
- Benameur A
- Publication year
- Publication venue
- Proceedings of the 2008 ACM workshop on Secure web services
External Links
Snippet
In Service Oriented Architecture Web Services, communication among services is banking on XML-Based messages, called SOAP messages. These messages are prone to attacks that are classified in literature as XML rewriting attacks. Since rewriting is a formal …
- 239000000344 soap 0 title abstract description 52
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Reed et al. | Decentralized identifiers (dids) v1. 0 | |
EP2173058B1 (en) | Context free and context sensitive XML digital signatures for SOAP messages | |
JP4949232B2 (en) | Method and system for linking a certificate to a signed file | |
Gajek et al. | Analysis of signature wrapping attacks and countermeasures | |
US20070220260A1 (en) | Protecting the integrity of electronically derivative works | |
US8375211B2 (en) | Optimization of signing soap body element | |
US20040078577A1 (en) | Method and apparatus for providing xml document encryption | |
US7293283B2 (en) | Flexible electronic message security mechanism | |
Lax et al. | Digital document signing: Vulnerabilities and solutions | |
Sinha et al. | A formal solution to rewriting attacks on SOAP messages | |
Wen et al. | Two Zero-Watermark methods for XML documents | |
Eastlake et al. | Secure XML: The New Syntax for Signatures and Encryption | |
Bartel et al. | XML signature syntax and processing version 1.1 | |
Bhargavan et al. | A semantics for web services authentication | |
Polivy et al. | Authenticating distributed data using Web services and XML signatures | |
Modak et al. | Vulnerability of cloud: Analysis of XML signature wrapping attack and countermeasures | |
Makino et al. | Improving WS-Security performance with a template-based approach | |
Taft et al. | The application/pdf media type | |
Barhoom et al. | Position of signed element for SOAP message integrity | |
Sun et al. | XML undeniable signatures | |
Islam et al. | An approach to security for unstructured big data | |
Abd El-Aziz et al. | A comprehensive presentation to XML signature and encryption | |
Xavier | XML based security for e-commerce applications | |
Teraguchi et al. | Optimized web services security performance with differential parsing | |
Thummel et al. | Design and implementation of a file transfer and web services guard employing cryptographically secured XML security labels |