Research and implementation of security architecture for Web service runtime
-
摘要: 使用安全管理域等基本概念分析了Web服务运行管理平台WSR(Web Service Runtime)的应用模式和安全需求.提出了基于链式处理结构的WSR安全结构.该结构支持多种新型安全技术和规范,灵活、可配置,为WSR及其所管理的Web服务提供了较为全面的安全保护.Abstract: The application modes and security requirements of Web service runtime (WSR) were analyzed using several fundamental concepts, such as security administration domain. A security architecture based on processing chain structure was presented. The security architecture supports the latest security technologies and related specifications. It's flexible and configurable, provides fairly comprehensive protection for WSR and those Web services managed by it.
-
Key words:
- networks /
- safety /
- Web service /
- security architecture /
- security policy
-
[1] 舒 剑. Web Service运行管理平台的研究与实现 . 北京:北京航空航天大学计算机学院, 2003 Shu Jian. Research and implemetation of Web service run time platform . Beijing:School of Computer Science and Technology, Beijing University of Aeronautics and Astrohautics,2003(in Chinese) [2] Martin G, MarC H, Noah M, et al. SOAP version 1.2 part 1:message framework (W3C candidate recommendation) . http://www.w3.org/TR/2002/CR-soap12-part1-20021219/, 2002-12-19/2002-12-23 [3] OASIS. Assertions and protocol for the OASIS security assertions markup language . http://www.oasis-open.org/committees/security/docs/, 2002-11-05/2002-12-23 [4] Allen B, Barbara F, Satoshi H, et al. SOAP security extensions:digital signature . http://www.w3.org/TR/2001/NOTE-SOAP-dsig-20010206/, 2001-02-06/2002-12-23 [5] IBM & Microsoft. Security in a Web service world:a proposed architecture and roadmap . http://www-106.ibm.com/developer works/webservices/library/ws-secmap/, 2002-04-07/2002-12-23 [6] Foster I, Kesselman C, Tsudik G, et al. A security architecture for computational grids . Proceedings of the 5th ACM Conference on Computer and Communications Security . CA:San Francisco,1998.83~92 [7] Bob A, Giovanni D, Satoshi H, et al. Web services security (WS-security) . http://www-106.ibm.com/developerworks/Web services/library/ws-secure/, 2002-04-05/2002-12-23 [8] Sandhu R, Conyne E J, Lfeinstein H, et al. Role based access control models[J]. IEEE Computer, 1996,29(2):38~47 [9] Warwick F, Phillip H, Barbara F,et al. XML key management specification .http:// www.w3.org/TR/2001/NOTE-xkms-20010330/, 2001-03-30/2002-12-23
点击查看大图
计量
- 文章访问数: 2728
- HTML全文浏览量: 139
- PDF下载量: 9
- 被引次数: 0