Security Protection using Simple Object Access Protocol (SOAP) Messages Techniques

被引:0
|
作者
Waleed, Ghossoon M. [1 ]
Ahmad, R. Badlishah [1 ]
机构
[1] UniMAP, Sch Comp & Commun, Kangar 01007, Perlis, Malaysia
关键词
SOAP message; Web Service; Encryption; Secure Communication; Attacks;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Web Services are modular and distributed applications and are based on industry standard technologies. Nowadays, a message traveling through Internet is relatively simple to be read or modified [1]. This is due to the complexity of network and the existence of many points of attack. SOAP is a protocol specification for invoking methods on servers, services, components and objects, a way to create widely distributed complex computing environments that run over the Internet using existing Internet infrastructure. SOAP is about applications communicating directly with each other over the Internet in a very rich way. The Simple Object Access Protocol (SOAP), allows communication across heterogeneous platforms. Some of the security procedures (authentication, authorization and encryption) are needed to represent a web service protocols. Sensitive information is used across the network [3]. This paper focuses on the attacks of the message by intruders and how to prevent these messages when they are exchange data between server and clients, or when traveling queries through the application web service. Where Protocol binding framework used to allow SOAP messages to be transported using different protocols (HTTP, SMTP, ....) The development of security infrastructure to provide secure communications among users using "encryption" for SOAP messages for queries transfer, and establishment of a framework to develop security applications and other information queries, to solve the problem of many attacks as an intruders. The .Net framework used to transmit queries between server and clients through the Encrypted SOAP messages using Agent system and depending on the XMLP-based Protocols.
引用
收藏
页码:437 / 442
页数:6
相关论文
共 25 条
  • [1] Optimizing Libraries' Content Findability Using Simple Object Access Protocol (SOAP) With Multi-Tier Architecture
    Lahinta, A.
    Haris, I
    Abdillah, T.
    [J]. 1ST ANNUAL APPLIED SCIENCE AND ENGINEERING CONFERENCE (AASEC), IN CONJUCTION WITH THE INTERNATIONAL CONFERENCE ON SPORT SCIENCE, HEALTH, AND PHYSICAL EDUCATION (ICSSHPE), 2017, 180
  • [2] QOS Affluent Web Services Message Communication Using Secured Simple Object Access Protocol ( SOAP) Technique
    Anithadevi, N.
    Sundarambal, M.
    [J]. DIGITAL CONNECTIVITY - SOCIAL IMPACT, 2016, 679 : 191 - 207
  • [3] A histogram-based method for efficient detection of rewriting attacks in simple object access protocol messages
    Nasridinov, Aziz
    Jeong, Young-Sik
    Byun, Jeong-Yong
    Park, Young-Ho
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (06) : 492 - 499
  • [4] The simple object access protocol in Web Services architecture
    Liu, B
    Shi, MH
    Chen, DR
    [J]. COMPUTER SCIENCE AND TECHNOLOGY IN NEW CENTURY, 2001, : 563 - 567
  • [5] Object Security Scheme based on Access Policies using MQTT Protocol for IoT Devices
    Nathi, Rohan A.
    Sutar, Dimpal
    [J]. 2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [6] A web product data management system based on Simple Object Access Protocol
    陆静平
    [J]. Journal of Chongqing University(English Edition), 2003, (01) : 57 - 61
  • [7] Data Retrieval and Security using Lightweight Directory Access Protocol
    Salim, Mohammad
    Akhtar, M. Sana
    Qadeer, Mohammed A.
    [J]. WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 685 - 688
  • [8] Routing Protocol Security Using Symmetric Key Based Techniques
    Bruhadeshwar, Bezawada
    Kothapalli, Kishore
    Poornima, M.
    Divya, M.
    [J]. 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 193 - 200
  • [9] Patient privacy protection using anonymous access control techniques
    Weerasinghe, D.
    Rajarajan, M.
    Elmufti, K.
    Rakocevic, V.
    [J]. METHODS OF INFORMATION IN MEDICINE, 2008, 47 (03) : 235 - 240
  • [10] A scalable IT infrastructure for automated monitoring systems based on the distributed computing technique using simple object access protocol Web-services
    Hsieh, Yo-Ming
    Hung, Yu-Cheng
    [J]. AUTOMATION IN CONSTRUCTION, 2009, 18 (04) : 424 - 433