JIS  Vol.2 No.1 , January 2011
SOAP-Based Security Interaction of Web Service inHeterogeneous Platforms
Author(s) Tao Xu, Chunxiao Yi*
ABSTRACT
With the development and application of SOA technology, security issues of Web services based on heterogeneous platform have become increasingly prominent. The security of SOAP message is of great importance to Web service security. In order to solve the security issue of heterogeneous platforms, a security processing model named SIMSA (Security Interactive Model based on SOAP and Authentication) based on SOAP and authentication is proposed in this paper. By experimental verification, the model ensures the safety of SOAP message transmission and enhances the security of Web service in heterogeneous platforms.

Cite this paper
nullT. Xu and C. Yi, "SOAP-Based Security Interaction of Web Service inHeterogeneous Platforms," Journal of Information Security, Vol. 2 No. 1, 2011, pp. 1-7. doi: 10.4236/jis.2011.21001.
References
[1]   F. Satoh, et al., “Adding Authentication to Model Driven Security,” IEEE International Conference on Web Services (ICWS), Chicago, 2006, pp. 585-594. doi:10.1109/ ICWS.2006.25

[2]   K. Bhargavan, C. Fournet, et al., “An Advisor for Web Services Security Policies,” Proceedings of the 2005 workshop on Secure web services, New York, 2005, pp. 1-9. doi:10.1145/1103022.1103024

[3]   S. Weber, P. Austel and M. McIntosh, “A Framework for Multi-Platform SOA Security Analyses,” IEEE International Conference on Web Service, Salt Lake City, 2007, pp. 102-109.

[4]   J. Viega, “Why Applying Standards to Web Services is not Enough,” IEEE Security and Privacy, Vol. 4, No. 4, 2006, pp. 25-31. doi:10.1109/MSP.2006.110

[5]   Z. P. Liu, D. D. Zhou, L. Y. Xue, X. M. Chang and X. J. Song, “A Security Model of Web Service Based on SOAP,” Journal of Wuhan University in Chinese, Vol. 52, No. 5, 2006, pp. 570-573.

[6]   L. Y. Tang and S. H. Qing, “Administration of Multiple Roles in the Hybrid RBAC-DTE Policy,” Chinese Journal of Computers, in Chinese, Vol. 29, No. 8, 2006, pp. 1419-1425.

[7]   X. M. Wang and Z. T Zhao, “Role-Based Access Control Model of Temporal Object,” Acta Electronica Sinica, in Chinese, Vol. 33, No. 9, 2005, pp. 1634-1638.

[8]   W. F. Zheng, T. Xu and Q. F Gu, “Design and Implementation of Core Service in Civil Aviation Integrated Information Platform,” Computer Engineering, In Chi- nese, Vol. 34, No. 21, 2008, pp. 267-269.

[9]   R. Bunge, S. Chung, B. Endicott-Popovsky and D. McLane, “An Operational Framework for Service Oriented Architecture Network Security,” Proceedings of the 41st Hawaii International Conference on System Sciences, Waikoloa, 2008, pp. 312-320.

[10]   N. Bieberstein, S. Bose, M. Fiammante, K. Jones, R. Shah and Z. Ning, “Service-Oriented Architecture Gu- ide,” in Chinese, Posts & Telecom Press, Beijing, 2008, pp. 160-166.

[11]   Z. P. Liu, X. M. Chang, D. D. Zhou and X. J. Song, “A Safe ID Authentication Policy in Web Service,” Journal of Computer Research and Development, in Chinese, Vol. 43, 2006, pp. 551-555.

 
 
Top