期刊文献+

一种跨信任域的Web Services端到端通信安全解决方案 被引量:1

A SOLUTION ON CROSS THE TRUSTED-DOMAIN END-TO-END COMMUNICATION SECURITY IN WEB SERVICES
在线阅读 下载PDF
导出
摘要 随着W eb Services的广泛应用,其安全问题已经越来越受到人们的重视。针对W eb Services应用中一种跨信任域的端到端通信的安全性提出了一个解决方案,方案解决了安全身份认证、授权、消息的不可抵赖性、完整性和机密性。方案将各种安全机制封装在一起,提供统一的安全接口,使安全的部署更灵活,更容易拓展新的安全机制,以适应现今日益增加的安全需求。 With Web Services widely used, security of it has attracted more and more people's attention. In this paper, focusing on the application of Web Services, a solution on cross the trusted-domain end-to-end communication security has been provided. This solution will figure out authentication, authorization and the information's non-repudiation, integrity and confidentiality. In this frame, several secure mechanisms are encapsulated to provide a uniform interface, which facilitates the deployment and develops new secure mechanism easily. This will adapt more and more security demands.
出处 《计算机应用与软件》 CSCD 北大核心 2006年第8期128-130,共3页 Computer Applications and Software
关键词 WEB SERVICES 安全性 端到端 跨信任域 Web services Security End-to-end Cross the trusted-domain
  • 相关文献

参考文献5

  • 1安全断言标记语言(SAML),2004.2.http:/www.oasis—open.org/committees/tc_home.php?wg_abbrev=security.
  • 2可扩展访问控制标记语言(XACML),2003.2.http://www.oasisopen.org/committees/tc_home.php?wg_abbrev=xacml.
  • 3Shmueli O. Architectures for internal Web Services deployment. In:Apers P,ed. Proc. of the 27th Int'l Conf. on Very Large Data Bases. Roma:Morgan Kaufmann Publishers,641 -644.2001.
  • 4岳昆,王晓玲,周傲英.Web服务核心支撑技术:研究综述[J].软件学报,2004,15(3):428-442. 被引量:556
  • 5Thelin J,Murray PJ. A public Web Services security framework based on current and future usage scenarios. In : Arabnia H, eds. Proc. of the Int'lConf. on Intemet Computing( IC2002 ). Las Vegas : CSREA Press,2001.825 - 833.

二级参考文献59

  • 1周傲英 凌波.Peer-to-Peer系统及其应用.计算机科学,2002,29(8):200-203.
  • 2Web Services Transaction Specification. http://www-106.ibm.com/developerworks/library/ws-transpec/
  • 3Cabrera F, Copeland G, Cox B, Freund T, Klein J, Storey T, Thatte S. Web services transaction. http://www.infosys.tuwien.ac.at/Teaching/Courses/IntAppl/Papers/ws-transpec.pdf
  • 4Mikalsen T, Rouvellou I, Tai S. Reliability of composed Web services from object transactions to Web transactions. In: Proc. of the OOPSLA 2001 Workshop on Object-Oriented Web Services. 2001.
  • 5Benatallah B, Dumas M, Sheng QZ, Ngu AHH. Declarative composition and peer-to-peer provisioning of dynamic services. In:Proc. of the 18th Int'l Conf. on Data Engineering. San Jose: IEEE Computer Society, 2002. 297~308.
  • 6Mennie D, Pagurek B. A runtime composition service creation and deployment and its applications in internet security,E-commerce and software provisioning. In: Proc. of the 25th Annual Int'l Computer Software and Applications Conf. (COMPSAC 2001). Chicago:
  • 7Tosic V, Mennie D, Pagurek B. On dynamic service composition and its applicability to business software systems. In: Workshop on Object-Oriented Business Solutions (WOOBS2001). 2001.
  • 8Steen MV, Tanenbaum A, Kuz I, Sips H. A scalable middle-ware solution for advanced wide-aera Web services. Distributed Systems Engineering, 1999,6( 1 ): 34-42.
  • 9Burstein MH, Hobbs JR, Lassila O, Martin D, McDermott DV, McIlraith SA, Narayanan S, Paolucci M, Payne T, Sycara K.DAML-S: Web service description for the semantic Web. In: Horrocks, ed. Proc. of the Int'l Semantic Web Conf. Sardinia:Springer-Verlag, 2002
  • 10Narayanan S, McIlraith SA. Simulation, verification and automated composition of Web services. In: Proc. of the 11th Int'l World Wide Web Conf. WWW2002. Honolulu: ACM, 2002.77-88.

共引文献555

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部