Beznosov et al., 2005 - Google Patents
Introduction to Web services and their securityBeznosov et al., 2005
- Document ID
- 15213469513571447684
- Author
- Beznosov K
- Flinn D
- Kawamoto S
- Hartman B
- Publication year
- Publication venue
- Information Security Technical Report
External Links
Snippet
Web services enable access to data that has previously been locked within corporate networks and accessible only by using custom-built software. Along with the benefits of Web services comes a serious risk of security breaches. This article gives a brief overview of the …
- 239000000344 soap 0 abstract description 111
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10810515B2 (en) | Digital rights management (DRM)-enabled policy management for an identity provider in a federated environment | |
US7346923B2 (en) | Federated identity management within a distributed portal server | |
Hondo et al. | Securing web services | |
US20100100924A1 (en) | Digital Rights Management (DRM)-Enabled Policy Management For A Service Provider In A Federated Environment | |
Nakamur et al. | Towards the integration of Web services security on enterprise environments | |
Feng et al. | Role-based access control system for web services | |
Geuer-Pollmann et al. | Web services and web service security standards | |
Beznosov et al. | Introduction to Web services and their security | |
Boncella | Web services and web services security | |
King | Threats and Solutions to Web Services Security | |
Komathy et al. | Security for XML messaging services—a component-based approach | |
Meduri | Webservice security | |
Standard | WS-Trust 1.4 | |
Madsen | Federated identity and web services | |
Bertino et al. | Standards for web services security | |
Perišić et al. | Security Issues in Applying Web Services within Business Applications: a Case Study | |
O'Ree et al. | Security enhancements for UDDI | |
Li et al. | Zebra copy: A reference implementation of federated access management | |
Cantor | SAML 2.0 Single Sign-On with Constrained Delegation | |
Kogan | Web services security-focus on SAML and XACML | |
Cahill et al. | Liberty ID-WSF Implementation Guide | |
Çamlibel | Secure service oriented architecture (soa) applications for subscriber based web services and its intranet support | |
Cater | SOA: Service-Oriented Architecture | |
Cater | Service-Oriented Architecture and Web Services Security | |
Curphey | Web services: Developers dream or hackers heaven? |