Security policy of network messages based on SOAP

被引:0
|
作者
Zhang, Gong-Xuan [1 ]
Song, Bin [1 ]
Wang, Ping-Li [1 ]
机构
[1] School of Computer Science and Technology, NUST, Nanjing 210094, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:66 / 70
相关论文
共 50 条
  • [41] Security framework for home network: Authentication, authorization, and security policy
    Kim, Geon Woo
    Lee, Deok Gyu
    Han, Jong Wook
    Kim, Sang Choon
    Kim, Sang Wook
    [J]. EMERGING TECHNOLOGIES IN KNOWLEDGE DISCOVERY AND DATA MINING, 2007, 4819 : 621 - +
  • [42] Research of Web service security model based on SOAP information
    Pei, Shujun
    Chen, Deyun
    Chu, Yuyuan
    Xu, Qingfeng
    Xi, Shi
    [J]. Information Technology Journal, 2012, 11 (02) : 241 - 247
  • [43] Research of E-Business Security Based on SOAP Protocol
    Wang, Yiran
    [J]. MANUFACTURING PROCESS TECHNOLOGY, PTS 1-5, 2011, 189-193 : 4304 - 4307
  • [44] Network & Information Security - Messages from Guest Editors for the Special Issue
    Hu Jianbin
    Gui Nike
    [J]. CHINA COMMUNICATIONS, 2009, 6 (04) : 65 - 65
  • [45] Efficient Network Security Policy Enforcement With Policy Space Analysis
    Wang, Xiang
    Shi, Weiqi
    Xiang, Yang
    Li, Jun
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (05) : 2958 - 2970
  • [46] Security policy for deducting unauthorized IP based mobile host inside the network
    Sanjeevi, V. K.
    Veluchandhar, K.
    Sakthivel, S.
    Supriya, M.
    [J]. ELECTRONICS AND COMMUNICATIONS: PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON ELECTRONICS, HARDWARE, WIRELESS AND OPTICAL COMMUNICATIONS (EHAC '08), 2008, : 177 - +
  • [47] Flex-SwA: Flexible exchange of binary data based on SOAP messages with attachments
    Heinzl, Steffen
    Mathes, Markus
    Friese, Thomas
    Smith, Matthew
    Freisleben, Bernd
    [J]. ICWS 2006: IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, 2006, : 3 - +
  • [48] Fractal self-similarity measurements based clustering technique for SOAP Web messages
    Al-Shammary, Dhiah
    Khalil, Ibrahim
    Tari, Zahir
    Zomaya, Albert Y.
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2013, 73 (05) : 664 - 676
  • [49] Discussion on Security Policy of Dam Safe Monitoring System based Network Environment
    Zhang, Xiaohua
    Zhu, Zhaohui
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND ENGINEERING INNOVATION, 2015, 12 : 1265 - 1269
  • [50] Improved Genetic Feedback Algorithm Based Network Security Policy Frame Work
    Mishra, Atish
    Jhapate, Arun Kumar
    Kumar, Prakash
    [J]. SECOND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS: ICFN 2010, 2010, : 8 - 10