[go: up one dir, main page]

Yu et al., 2005 - Google Patents

Trustworthy web services based on testing

Yu et al., 2005

Document ID
18392261881701631510
Author
Yu W
Supthaweesuk P
Aravind D
Publication year
Publication venue
IEEE International Workshop on Service-Oriented System Engineering (SOSE'05)

External Links

Snippet

The Web services technology allows software components independently developed in disparate platforms to communicate in a seamless manner. They constitute a loosely coupled, distributed system that is highly scalable. But, they also inherit the vulnerabilities of …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/102Entity profiles
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities

Similar Documents

Publication Publication Date Title
Salas et al. Security testing methodology for vulnerabilities detection of xss in web services and ws-security
Patel A survey on vulnerability assessment & penetration testing for secure communication
Ravindran et al. A Review on Web Application Vulnerability Assessment and Penetration Testing.
Yu et al. Software vulnerability analysis for web services software systems
Masood et al. Static analysis for web service security-Tools & techniques for a secure development life cycle
US11729176B2 (en) Monitoring and preventing outbound network connections in runtime applications
Zeng et al. Full-stack vulnerability analysis of the cloud-native platform
Calzavara et al. Testing for integrity flaws in web sessions
Sidharth et al. A framework for enhancing web services security
Tyler et al. Towards Browser Controls to Protect Cookies from Malicious Extensions
Yu et al. Trustworthy web services based on testing
Razmov et al. Practical automated filter generation to explicitly enforce implicit input assumptions
Lincke Understanding software threats and vulnerabilities
Larson et al. A new security metric for soa implementations
Bijjou Web Application Firewall Bypassing: An Approach for Penetra
Jaamour Securing web services
Endsuleit et al. A security analysis on jade (-s) v. 3.2
Sadana et al. Analysis of cross site scripting attack
de Sousa Rodrigues An OSINT Approach to Automated Asset Discovery and Monitoring
Gula et al. Performing PCI DSS and OWASP Web Application Audits with Nessus
Uroz Advances in Cybersecurity Incident Prevention and Analysis
Bakos et al. Ubiquitous Redirection as Access Control Response.
Jnena Modern Approach for WEB Applications Vulnerability Analysis
WO2025029704A1 (en) System and method for attacker interdiction using track and trace user and entity behavior analysis
Bau Network and Web Security Modeling and Analysis