[go: up one dir, main page]

Beznosov et al., 2005 - Google Patents

Introduction to Web services and their security

Beznosov et al., 2005

Document ID
15213469513571447684
Author
Beznosov K
Flinn D
Kawamoto S
Hartman B
Publication year
Publication venue
Information Security Technical Report

External Links

Snippet

Web services enable access to data that has previously been locked within corporate networks and accessible only by using custom-built software. Along with the benefits of Web services comes a serious risk of security breaches. This article gives a brief overview of the …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications

Similar Documents

Publication Publication Date Title
US10810515B2 (en) Digital rights management (DRM)-enabled policy management for an identity provider in a federated environment
US7346923B2 (en) Federated identity management within a distributed portal server
Hondo et al. Securing web services
US20100100924A1 (en) Digital Rights Management (DRM)-Enabled Policy Management For A Service Provider In A Federated Environment
Nakamur et al. Towards the integration of Web services security on enterprise environments
Feng et al. Role-based access control system for web services
Geuer-Pollmann et al. Web services and web service security standards
Beznosov et al. Introduction to Web services and their security
Boncella Web services and web services security
King Threats and Solutions to Web Services Security
Komathy et al. Security for XML messaging services—a component-based approach
Meduri Webservice security
Standard WS-Trust 1.4
Madsen Federated identity and web services
Bertino et al. Standards for web services security
Perišić et al. Security Issues in Applying Web Services within Business Applications: a Case Study
O'Ree et al. Security enhancements for UDDI
Li et al. Zebra copy: A reference implementation of federated access management
Cantor SAML 2.0 Single Sign-On with Constrained Delegation
Kogan Web services security-focus on SAML and XACML
Cahill et al. Liberty ID-WSF Implementation Guide
Çamlibel Secure service oriented architecture (soa) applications for subscriber based web services and its intranet support
Cater SOA: Service-Oriented Architecture
Cater Service-Oriented Architecture and Web Services Security
Curphey Web services: Developers dream or hackers heaven?