Algorithm for Securing SOAP Based Web Services from WSDLScanning Attacks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: The Web Services are the emerging paradigm of Service Oriented Architecture (SOA) in the modernenterprise computing to achieve interconnection of related applications in an organization in terms of services.A service is a Software component which fulfills a defined functionality and does not depend on the context ofother services. In programming terms, the service is called as web method which is a function that accepts inputparameters and returns the output. The data types of input/output parameters may be simple or complex. In SO Aarchitecture, the list of web methods that a web service offers and the data types of their input/outputparameters are described using Web Services Description Language (WSDL) standard and published toUniversal Description, Discovery and Integration (UDDI) service registry where the web services clients searchthe service registry for obtaining the required WSDL and start binding to the web server. The WSDL is pronefor SOA attacks as the WSDL is represented in XML format which is a plain text. Even though few researchersproposed solutions for WSDL, those solutions are inadequate concerning to the modern communicationtechnologies and they are not able to achieve any landmark in providing security for WSDL attacks. This paperproposes a new algorithm for preventing WSDL attacks which uses the existing security standards such as Public Key Infrastructure (PKI), Digital Signatures, and XML Encryption/Decryption standards.
Authors and Affiliations
Mohamed Ibrahim B , Mohamed Shanavas A R
Improving the Security Layer logic for a Health Care Information System
Abstract: In a previous paper we suggested an information system to store, manage and treat millions of the gathered patient’s information. We were able to propose a reliable application, which is able to fulfill the mos...
Study of Java Access Control Mechanism
a class as "a collection of data and methods." One of the important object-oriented techniques is hiding the data within the class and making it available only through the methods. This technique is known as &nbs...
Corporate Policy Governance in Secure MD5 DataChanges and Multi Hand Administration
Abstract: Policy based management is an administrative approach that simplify the management of a givenendeavor by establishing policies to deal with situation that are likely to occur. Most of the social network andmobi...
Swot Analysis Of Software Quality Metrics For Global Software Development: A Systematic Literature Review Protocol
CONTEXT – Global Software Development (GSD) is a modern software engineering paradigm adopted by many client organisations in developed countries to get high quality product at low cost in low wage countries. Pro...
VLSI Implementation of High Speed & Low Power Multiplier in FPGA
We known that different multipliers consume most of the power in DSP computations, FIR filters. Hence, it is very important factor for modern DSP systems to built low-power multipliers to minimize the power  ...