An Imperceptible Security Method for Web Services
نویسندگان
چکیده
منابع مشابه
Web Services and Web Services Security
Web services are self-contained modular applications that provide a computation upon request. These services can be described, published, located, and invoked over a network, generally over the Internet. However, intranets, extranets, and LANs can also be used. as well. In using web services for its information systems needs, a firm may open access to its information assets. This action can bec...
متن کاملWeb Services Security (WS-Security)
WS-Security describes enhancements to SOAP messaging to provide quality of protection through message integrity, message confidentiality, and single message authentication. These mechanisms can be used to accommodate a wide variety of security models and encryption technologies. WS-Security also provides a general-purpose mechanism for associating security tokens with messages. No specific type...
متن کاملRunning head: Policies for Web Security Services Policies for Web Security Services
This chapter analyzes the various types of policies implemented by the web security services. According to X.800 definition five are the basic web security services categories: authentication, non-repudiation, access control, data integrity and data confidentiality. In this chapter we discuss access control and data privacy services. Access control services may adopt various models according to...
متن کاملHigh Imperceptible Encoding for Computer Networks Security
Today, computer and network technologies provide easy-to-use communication channels for steganography. In most algorithm used to secure information both steganography and cryptography are used together to secure a part of information. Steganography has many technical challenges such as high hiding capacity and imperceptibility. Digital Steganography exploits the use of a host data to hide a pie...
متن کاملManaging Web Services Security
The promising features of Web services also make them vulnerable to new types of security threats. Web service providers must assure their clients’ confidentiality, integrity and availability over a trusted relationship that may be asynchronous and that may involve multiple business partners. Despite the continued significance of the traditional approaches to securing content, transmission and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of u- and e- Service, Science and Technology
سال: 2017
ISSN: 2005-4246,2005-4246
DOI: 10.14257/ijunesst.2017.10.9.12