[go: up one dir, main page]

Sinha et al., 2008 - Google Patents

A formal solution to rewriting attacks on SOAP messages

Sinha et al., 2008

Document ID
15269207258691953941
Author
Sinha S
Benameur A
Publication year
Publication venue
Proceedings of the 2008 ACM workshop on Secure web services

External Links

Snippet

In Service Oriented Architecture Web Services, communication among services is banking on XML-Based messages, called SOAP messages. These messages are prone to attacks that are classified in literature as XML rewriting attacks. Since rewriting is a formal …
Continue reading at dl.acm.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems

Similar Documents

Publication Publication Date Title
Reed et al. Decentralized identifiers (dids) v1. 0
EP2173058B1 (en) Context free and context sensitive XML digital signatures for SOAP messages
JP4949232B2 (en) Method and system for linking a certificate to a signed file
Gajek et al. Analysis of signature wrapping attacks and countermeasures
US20070220260A1 (en) Protecting the integrity of electronically derivative works
US8375211B2 (en) Optimization of signing soap body element
US20040078577A1 (en) Method and apparatus for providing xml document encryption
US7293283B2 (en) Flexible electronic message security mechanism
Lax et al. Digital document signing: Vulnerabilities and solutions
Sinha et al. A formal solution to rewriting attacks on SOAP messages
Wen et al. Two Zero-Watermark methods for XML documents
Eastlake et al. Secure XML: The New Syntax for Signatures and Encryption
Bartel et al. XML signature syntax and processing version 1.1
Bhargavan et al. A semantics for web services authentication
Polivy et al. Authenticating distributed data using Web services and XML signatures
Modak et al. Vulnerability of cloud: Analysis of XML signature wrapping attack and countermeasures
Makino et al. Improving WS-Security performance with a template-based approach
Taft et al. The application/pdf media type
Barhoom et al. Position of signed element for SOAP message integrity
Sun et al. XML undeniable signatures
Islam et al. An approach to security for unstructured big data
Abd El-Aziz et al. A comprehensive presentation to XML signature and encryption
Xavier XML based security for e-commerce applications
Teraguchi et al. Optimized web services security performance with differential parsing
Thummel et al. Design and implementation of a file transfer and web services guard employing cryptographically secured XML security labels