Volume 29 Issue 10
Oct.  2003
Turn off MathJax
Article Contents
Xue Wei, Liu Xudong, Ge Sheng, et al. Research and implementation of security architecture for Web service runtime[J]. Journal of Beijing University of Aeronautics and Astronautics, 2003, 29(10): 885-888. (in Chinese)
Citation: Xue Wei, Liu Xudong, Ge Sheng, et al. Research and implementation of security architecture for Web service runtime[J]. Journal of Beijing University of Aeronautics and Astronautics, 2003, 29(10): 885-888. (in Chinese)

Research and implementation of security architecture for Web service runtime

  • Received Date: 05 Jun 2003
  • Publish Date: 31 Oct 2003
  • The application modes and security requirements of Web service runtime (WSR) were analyzed using several fundamental concepts, such as security administration domain. A security architecture based on processing chain structure was presented. The security architecture supports the latest security technologies and related specifications. It's flexible and configurable, provides fairly comprehensive protection for WSR and those Web services managed by it.

     

  • loading
  • [1] 舒 剑. Web Service运行管理平台的研究与实现 . 北京:北京航空航天大学计算机学院, 2003 Shu Jian. Research and implemetation of Web service run time platform . Beijing:School of Computer Science and Technology, Beijing University of Aeronautics and Astrohautics,2003(in Chinese)[2] Martin G, MarC H, Noah M, et al. SOAP version 1.2 part 1:message framework (W3C candidate recommendation) . [3] OASIS. Assertions and protocol for the OASIS security assertions markup language . [4] Allen B, Barbara F, Satoshi H, et al. SOAP security extensions:digital signature . [5] IBM & Microsoft. Security in a Web service world:a proposed architecture and roadmap . [6] Foster I, Kesselman C, Tsudik G, et al. A security architecture for computational grids . Proceedings of the 5th ACM Conference on Computer and Communications Security . CA:San Francisco,1998.83~92[7] Bob A, Giovanni D, Satoshi H, et al. Web services security (WS-security) . [8] Sandhu R, Conyne E J, Lfeinstein H, et al. Role based access control models[J]. IEEE Computer, 1996,29(2):38~47[9] Warwick F, Phillip H, Barbara F,et al. XML key management specification .
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(2861) PDF downloads(11) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return