DOI QR코드

DOI QR Code

A Security Enhancement Method for Web Service

웹서비스 보안성 강화 방안

  • 이성훈 (백석대학교 정보통신학부)
  • Received : 2013.10.21
  • Accepted : 2013.12.20
  • Published : 2013.12.28

Abstract

As the Internet has been growing, WWW(World Wide Web) based services were popularized and users using the service were increased excessively. Recently, the instances of communications between the applications and interaction applications using the Web services in the implementation of the business logics among the enterprises are spread widely. Therefore, it has been emphasized quality and security of web services. In this paper, we described standard trends for web servises. And we analyzed the security policies to protect user's informations. Eventually, We described a security enhancement method for web service.

Keywords

Web;Web service;SOAP;WSDL;Security

References

  1. M.P. Papazoglou and D. Georgakopoulos, "Service-Oriented Computing," CACM, Vol. 46, No. 10, Oct 2003.
  2. W3C, Web Services Architecture, http://www.w3.org/ TR/2003/WD-ws-arch-20030808/
  3. F. Curbera et. al., "Unraveling the Web Services Web: An Introduction to SOAP, WSDL, and UDDI," IEEE Internet Computing, Vol. 6, No. 2, pp. 86-93, March/April 2002.
  4. W3C, Web Services Description Language(WSDL) 1.1, 2001, http://www.w3c.org/TR/wsdl
  5. W3C, Simple Object Access Protocol (SOAP) 1.1. 2000, http://www.w3c.org/TR/SOAP.
  6. P. Baglietto, M. Maresca, A. Parodi and N. Zingirian, "Deployment of Service Oriented Architecture for a Business Community," In Proc. of the Sixth International ENTERPRISE DISTRIBUTED OBJECT COMPUTING (EDOC'02), 2002.
  7. T. Erl. Service-Oriented Architecture (SOA): Concepts, Technology, and Design. Prentice Hall, 2005.
  8. G. Alonso, F. Casati, H. Kuno, and V. Machiraju. Web Services Concepts, Architectures and Applications Series: Data-Centric Systems and Applications. Addison-Wesley Professional,, 2002.
  9. Jin-Su Park, "Enterprise Web Service Development", HongRung Publishing Company, 2004.
  10. N. Ratha, J. Connell, and R. Bolle, "Enhancing Security and Privacy in Biometrics-based Authentication Systems," IBM Systems Journal, Vol. 40, No. 3, pp. 614-634, 2001. https://doi.org/10.1147/sj.403.0614
  11. N. Ratha, J. Connell, and R. Bolle, "Cancelable Biometrics," Biometric Consortium, 2000.
  12. J. Cambier, et. al., "Application-Specific Biometric Templates," Proc. of AutoID, pp.167-171, 2002.
  13. A. K. Jain, A. Ross, and S. Pankanti, "A prototype hand geometry-based verification system," 2nd Int'l Conference on Audio- and Video-based Biometric Person Authentication, Washington D.C., pp. 161-171, March 22-24, 1999.

Cited by

  1. Pelvic Compression Belt Convergence Impact on the Thickness of Multifidus and Erector Spinae Muscles vol.7, pp.5, 2016, https://doi.org/10.15207/JKCS.2016.7.5.051
  2. The Convergence Study on the Effects of Three Pelvic Floor Muscle Excercise on Thickness of Pelvic Floor Muscle and Abdominal Muscles vol.7, pp.1, 2016, https://doi.org/10.15207/JKCS.2016.7.1.105
  3. Design of High Speed Data Acquisition and Fusion System with STM32 Processor vol.7, pp.1, 2016, https://doi.org/10.15207/JKCS.2016.7.1.009
  4. The Effect of PNF Stretching with Elastic Band on Ball Speed of High School Baseball Players vol.14, pp.12, 2016, https://doi.org/10.14400/JDC.2016.14.12.525