A Survey on Security of Web Services and its Implementations
Journal Title: EAI Endorsed Transactions on Cloud Systems - Year 2017, Vol 3, Issue 9
Abstract
Web Services are software snippets that can be integrated in HTTP and XML based messages based on web technology. Security plays a crucial role in web services. Web services provide a basis for system integration without any programming language and operating system constraint. The security of web services are determined by the secrecy and reliability of the XML based SOAP message that are used for communication. The valuable data stored on computers and servers over the internet need to be secured based on information security features. The security of web services is an important part and security algorithms using encryption techniques are implemented in web services for key generation and encryption of the messages in SOAP and RESTful Services, to provide more secure communication between two electronic devices. Our work focuses on a systematic study on the security features provided by SOAP and RESTful Services and tries to address the different issues faced in security and presents the research scope in the area of web security
Authors and Affiliations
Shridevi S. , Deepti Gautam
Dimensionality Reduction for Handwritten Digit Recognition
Human perception of dimensions is usually limited to two or three degrees. Any further increase in the number of dimensions usually leads to the difficulty in visual imagination for any person. Hence, machine learning rese...
Cloud-based IoT Analytics for the Smart Grid: Experiences from a 3-year Pilot
The transformation of electrical grids into smart-grid is seen as one of the major technological challenges of our times and at the same time as one of the key domains for Internet of Things (IoT). Smart-home technologie...
A Permission-Based Distributed Mutual Exclusion Algorithm allowing Quality of Service (PBDMEAQoS)
The main purpose of mutual exclusion in a distributed environment is to control access to a shared resource. Large-scale distributed systems such as clouds or grids provide shared informatics resources to its clients. In...
Indoor Positioning using cellular network and relay node for wearables
One of the key requirements in public safety domain is to know the exact location of user or wearable device. There are a plethora of Internet of Things based wearable devices which are getting used for geo-fencing and f...
On the Performance of General Cache Networks
The performance evaluation of cache networks has gain a huge attention due to content-oriented delivery technologies. If general network topologies are more realistic than hierarchical networks widely studied in the lite...