Survey on the Web Services Security Specifications

Article Preview

Abstract:

Web Services security specifications include SSL/TLS (Secure Socket Layer/Transport Layer Security), XML Encryption, XML Signature, WS-Security specification family, PKI-related specifications etc. SSL/TLS are implemented in non-XML frameworks at the transport level, and others are implemented in XML frameworks at the application level. These specifications can satisfy the different requirements of Web Services security (confidentiality, integrity, authenticity, authorization, authentication and nonrepudiation). XML-based specifications are propitious to the integration and interoperability of Web Services security. SSL/TLS is sufficient for the basic generic security of internal Web Services projects. WS-Security is probably overkill, especially with the heavy XML processing that is involved in WS-Security.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 655-657)

Pages:

1809-1814

Citation:

Online since:

January 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Marc Chanliau, "Web Services Security: What's Required To Secure A Service-Oriented Architecture," An Oracle White Paper, January 2008.

Google Scholar

[2] Security Assertions Mark-up Language (SAML) on http://www.oasis-open.org/committees/sec- urity/

Google Scholar

[3] XML Encryption Syntax and Processing on http://www.w3.org/ TR/xmlenc-core/

Google Scholar

[4] XML Signature Syntax and Processing (Second Edition) on http://www.w3.org/TR/xmldsig-cor- e/

Google Scholar

[5] Security in a Web services world: a proposed architecture and roadmap on http://msdn.microso- ft.com/en-us/library/ms977312.aspx

Google Scholar

[6] Web Services Security UsernameToken Profile 1.1 on http://www.oasis-open.org/committees/d- ownload.php/16782/wssv1.1-spec-os-UsernameTokenProfile.pdf

Google Scholar

[7] Web Services Security X.509 Certificate Token Profile on http://docs.oasis-open.org/wss/2004/ 01/oasis-200401-wss-x509- token-profile-1.0.pdf

Google Scholar

[8] Kerberos: The Network Authentication Protocol on http://web.mit.edu/kerberos/

Google Scholar

[9] Secure Electronic Transaction on http://en.wikipedia.org/wiki/Secure_Electronic_Transaction

Google Scholar