SOAP-Based Security Interaction of Web Service inHeterogeneous Platforms
Tao Xu, Chunxiao Yi
Civil Aviation University of China.
DOI: 10.4236/jis.2011.21001   PDF    HTML     5,256 Downloads   9,933 Views   Citations

Abstract

With the development and application of SOA technology, security issues of Web services based on heterogeneous platform have become increasingly prominent. The security of SOAP message is of great importance to Web service security. In order to solve the security issue of heterogeneous platforms, a security processing model named SIMSA (Security Interactive Model based on SOAP and Authentication) based on SOAP and authentication is proposed in this paper. By experimental verification, the model ensures the safety of SOAP message transmission and enhances the security of Web service in heterogeneous platforms.

Share and Cite:

Xu, T. and Yi, C. (2011) SOAP-Based Security Interaction of Web Service inHeterogeneous Platforms. Journal of Information Security, 2, 1-7. doi: 10.4236/jis.2011.21001.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] F. Satoh, et al., “Adding Authentication to Model Driven Security,” IEEE International Conference on Web Services (ICWS), Chicago, 2006, pp. 585-594. doi:10.1109/ ICWS.2006.25
[2] K. Bhargavan, C. Fournet, et al., “An Advisor for Web Services Security Policies,” Proceedings of the 2005 workshop on Secure web services, New York, 2005, pp. 1-9. doi:10.1145/1103022.1103024
[3] S. Weber, P. Austel and M. McIntosh, “A Framework for Multi-Platform SOA Security Analyses,” IEEE International Conference on Web Service, Salt Lake City, 2007, pp. 102-109.
[4] J. Viega, “Why Applying Standards to Web Services is not Enough,” IEEE Security and Privacy, Vol. 4, No. 4, 2006, pp. 25-31. doi:10.1109/MSP.2006.110
[5] Z. P. Liu, D. D. Zhou, L. Y. Xue, X. M. Chang and X. J. Song, “A Security Model of Web Service Based on SOAP,” Journal of Wuhan University in Chinese, Vol. 52, No. 5, 2006, pp. 570-573.
[6] L. Y. Tang and S. H. Qing, “Administration of Multiple Roles in the Hybrid RBAC-DTE Policy,” Chinese Journal of Computers, in Chinese, Vol. 29, No. 8, 2006, pp. 1419-1425.
[7] X. M. Wang and Z. T Zhao, “Role-Based Access Control Model of Temporal Object,” Acta Electronica Sinica, in Chinese, Vol. 33, No. 9, 2005, pp. 1634-1638.
[8] W. F. Zheng, T. Xu and Q. F Gu, “Design and Implementation of Core Service in Civil Aviation Integrated Information Platform,” Computer Engineering, In Chi- nese, Vol. 34, No. 21, 2008, pp. 267-269.
[9] R. Bunge, S. Chung, B. Endicott-Popovsky and D. McLane, “An Operational Framework for Service Oriented Architecture Network Security,” Proceedings of the 41st Hawaii International Conference on System Sciences, Waikoloa, 2008, pp. 312-320.
[10] N. Bieberstein, S. Bose, M. Fiammante, K. Jones, R. Shah and Z. Ning, “Service-Oriented Architecture Gu- ide,” in Chinese, Posts & Telecom Press, Beijing, 2008, pp. 160-166.
[11] Z. P. Liu, X. M. Chang, D. D. Zhou and X. J. Song, “A Safe ID Authentication Policy in Web Service,” Journal of Computer Research and Development, in Chinese, Vol. 43, 2006, pp. 551-555.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.