Back
 IJCNS  Vol.3 No.10 , October 2010
Solutions for 3 Security Problems and its Application in SOA-FCA Service Components Based SDO
Abstract: Service-Oriented Architecture (SOA), which is an open architecture, provides developers with more freedom. However, its security problem goes from bad to worse. By taking an insurance business in Formal Concept Analysis (SOA-FCA) Service Components based Service Data Object (SDO) data model transfer with proxy as an example, the security issue of SDO data model was analyzed in this paper and this paper proposed a mechanism to make sure that the confidentiality, integrity, and non-repudiation of SDO data model are preserved by applying encryption/decryption, digest, digital signature and so on. Finally, this mechanism was developed and its performance was evaluated in SOA-FCA Service Components.
Cite this paper: nullN. Wang, Z. Fang, K. Yan, Y. Tang and X. An, "Solutions for 3 Security Problems and its Application in SOA-FCA Service Components Based SDO," International Journal of Communications, Network and System Sciences, Vol. 3 No. 10, 2010, pp. 811-815. doi: 10.4236/ijcns.2010.310109.
References

[1]   T. Erl, “Service-Oriented Architecture (SOA): Concepts, Technology, and Design,” Prentice Hall PTR, Upper Saddle River, New Jersey, 2005.

[2]   B. Portier and F. Budinsky, “Introduction to SDO,” IBM developerWorks, 2004.

[3]   M. John, “Security Models: Encyclopedia of Software Engineering,” Wiley Press, 1994.

[4]   M. Benedikt, C. Cheeyonyong, W. F. Fan, et al, “Capturing Both Types and Constraints in Data Integration,” Proceedings of the ACM SIGMOD International Conference on Management of Data, San Diego, California, USA, 2003, pp. 277-288.

[5]   D. Chaum and H. Van Antwerpen, “Undeniable Signatures,” Advances in Cryptology-CRYPTO’89, LNCS 435. Berlin: Springer-Verlag, 1989.

[6]   S. W. Galbraith, “Invisibility and Anonymity of Undeniable and Confirmer Signatures,” Topics in Cryptology- CT-RSA’03, LNCS 2612, Springer-Verlag, Berlin, 2003.

 
 
Top