Web service security - XKMS (TrustPoint)

被引:0
|
作者
Baer, D [1 ]
Philipp, A [1 ]
Pohlmann, N [1 ]
机构
[1] Gelsenkirchen Univ Appl Sci, Dept Comp Sci, Distributed Syst & Informat Secur, D-45877 Gelsenkirchen, Germany
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web services have grown up and developed a considerable potential: They are based on an open, dynamic exchange of data. Their openness is their greatest plus and contributed to their wide acceptance. This openness, however, and the resulting lack of security is at the same time the barrier that prevents web services from being used on a broad basis. Web services have to become safe if they are to transmit sensitive data securely. The prerequisites for the secure electronic exchange of data and information are confidentiality, integrity, and reliability. The adequate means to meet these demands are encryption and the digital signature on the basis of cryptographic methods. A Public Key Infrastructure (PKI) provides the adequate software, protocols, and standards. If web services are to be protected comprehensively and on the long run, a PKI is needed. Establishing and operating a PKI, however, is a complex task requiring different protocols on the client side - and not all application programs respectively application terminals are able to meet these requirements. New approaches enable the easy communication with a PKI. Web services and the Simple Object Access Protocol (SOAP are easy means to make use of remote services within a Service Orientated Architecture (SOA). The XML Key Management Specification (XKMS defines a protocol with which keys can be validated and managed on the basis of XML via web services. The resulting advantages make using a PKI easier and leaner. In this work, the XKMS specification is introduced, its functional principle is explained, its advantages and disadvantages are described, and an insight is provided into the realization of a SKMS responder in the framework of the TrustPoint project.
引用
收藏
页码:250 / 258
页数:9
相关论文
共 50 条
  • [21] Providing Web service security in a federated environment
    DeLooze, Lori
    [J]. IEEE SECURITY & PRIVACY, 2007, 5 (01) : 73 - 75
  • [22] Security Concerns regarding a Federative Web Service
    Stefan, Iulia
    Enyedi, Szilard
    Miclea, Liviu
    Capatina, Donna
    Stoian, Ioan
    [J]. PROCEEDING OF 2016 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, QUALITY AND TESTING, ROBOTICS (AQTR), 2016, : 137 - 141
  • [23] Service level agreements: Web services and security
    Frankova, Ganna
    [J]. Web Engineering, Proceedings, 2007, 4607 : 556 - 562
  • [24] CLOUD COMPUTING SECURITY: AMAZON WEB SERVICE
    Narula, Saakshi
    Jain, Arushi
    Prachi
    [J]. 2015 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES ACCT 2015, 2015, : 501 - 505
  • [25] A Survey on Quantitative Evaluation of Web Service Security
    Zhou, Bo
    Shi, Qi
    Yang, Po
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 715 - 721
  • [26] Amazon Web Service Microservice Security Analysis
    Cardenas Sanchez, Brian Camilo
    Olarte Rojas, Carlos Arturo
    [J]. LOGOS CIENCIA & TECNOLOGIA, 2022, 14 (02): : 42 - 52
  • [27] Proxy-based Web Service Security
    Wu, Jian
    Huang, Zhimin
    [J]. 2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 1282 - 1288
  • [28] An advanced certificate validation service and architecture based on XKMS
    Ruiz-Martinez, Antonio
    Sanchez-Martinez, Daniel
    Inmaculada Marin-Lopez, C.
    Gil-Perez, Manuel
    Gomez-Skarmeta, Antonio F.
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2011, 41 (03): : 209 - 236
  • [29] Certificate validation scheme of open grid service usage XKMS
    Park, N
    Moon, K
    Sohn, S
    Park, C
    [J]. GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 849 - 858
  • [30] A Study on Web Service Analysis and Bio-information based Web Service Security Mechanism
    Lee, Seong-Hoon
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (02): : 77 - 86