Web service security - XKMS (TrustPoint)

被引:0
|
作者
Baer, D [1 ]
Philipp, A [1 ]
Pohlmann, N [1 ]
机构
[1] Gelsenkirchen Univ Appl Sci, Dept Comp Sci, Distributed Syst & Informat Secur, D-45877 Gelsenkirchen, Germany
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web services have grown up and developed a considerable potential: They are based on an open, dynamic exchange of data. Their openness is their greatest plus and contributed to their wide acceptance. This openness, however, and the resulting lack of security is at the same time the barrier that prevents web services from being used on a broad basis. Web services have to become safe if they are to transmit sensitive data securely. The prerequisites for the secure electronic exchange of data and information are confidentiality, integrity, and reliability. The adequate means to meet these demands are encryption and the digital signature on the basis of cryptographic methods. A Public Key Infrastructure (PKI) provides the adequate software, protocols, and standards. If web services are to be protected comprehensively and on the long run, a PKI is needed. Establishing and operating a PKI, however, is a complex task requiring different protocols on the client side - and not all application programs respectively application terminals are able to meet these requirements. New approaches enable the easy communication with a PKI. Web services and the Simple Object Access Protocol (SOAP are easy means to make use of remote services within a Service Orientated Architecture (SOA). The XML Key Management Specification (XKMS defines a protocol with which keys can be validated and managed on the basis of XML via web services. The resulting advantages make using a PKI easier and leaner. In this work, the XKMS specification is introduced, its functional principle is explained, its advantages and disadvantages are described, and an insight is provided into the realization of a SKMS responder in the framework of the TrustPoint project.
引用
收藏
页码:250 / 258
页数:9
相关论文
共 50 条
  • [31] A Study on Web Service Analysis and Bio-information based Web Service Security Mechanism
    Lee, Seong-Hoon
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (02): : 77 - 86
  • [32] Assessing the security of web service frameworks against Denial of Service attacks
    Oliveira, Rui Andre
    Laranjeiro, Nuno
    Vieira, Marco
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2015, 109 : 18 - 31
  • [33] Test as a Service: A framework for Web security TaaS service in cloud environment
    Tung, Yuan-Hsin
    Lin, Chen-Chiu
    Shan, Hwai-Ling
    [J]. 2014 IEEE 8TH INTERNATIONAL SYMPOSIUM ON SERVICE ORIENTED SYSTEM ENGINEERING (SOSE), 2014, : 212 - 217
  • [34] Certificate validation scheme of open grid service usage XKMS
    Park, N
    Moon, K
    Sohn, S
    Park, C
    [J]. GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 849 - 858
  • [35] 基于XKMS构建安全的Web Services
    高飞
    李志勇
    李强
    [J]. 计算机与网络, 2005, (19) : 55 - 57
  • [36] 基于XKMS与SAML的Web服务安全模型
    曹庆华
    罗键
    [J]. 计算机时代, 2009, (12) : 24 - 26
  • [37] 面向Web服务的XKMS模型设计与实现
    李昕
    张军
    [J]. 计算机工程与设计, 2010, 31 (08) : 1738 - 1742
  • [38] Towards Security and Privacy in Dynamic Web Service Composition
    El Kassmi, Ilyass
    Jarir, Zahi
    [J]. PROCEEDINGS OF 2015 THIRD IEEE WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS), 2015,
  • [39] Using aspects for security engineering of web service compositions
    Charfi, A
    Mezini, M
    [J]. 2005 IEEE International Conference on Web Services, Vols 1 and 2, Proceedings, 2005, : 59 - 66
  • [40] Web service security model using CBD architecture
    Park, Eun-Ju
    Kim, Haeng-Kon
    Lee, Roger Y.
    [J]. SERA 2007: 5TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT, AND APPLICATIONS, PROCEEDINGS, 2007, : 346 - +