Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
نویسنده
چکیده
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assaults. Business partners want to know that the business did enough to protect the information goods. The Web Service is the perfect blue print for the agile business environment due to loose in nature, flexibility re-usability, transparency, openness, comprehensibility and many more benefits. Web service is the upcoming wave for tomorrows business needs, in this concern the security is the one of the major challenging sector for the developers to guarantee the confidentiality, authentication, integrity, authorization and nonrepudiation of machine to machine interaction. So security is not negotiable to anticipate a secure artifact for web service. Web service Security features alone doesn’t make for software security. Building secure software means applying the software security touch points during design and implementation and it is not just simply dragging a particular security technology into an enterprise implementing it. It is a step in Planning, understanding, defining, and implementing the proper technology solution. This paper proposes service level security for banking infrastructure that interweaves all the process activities and deliverables of service with SE activities. It is a new idea to authenticate the Web Service Consumer using Expected Clandestine Figure (ECF).
منابع مشابه
Web Service Choreography Verification Using Z Formal Specification
Web Service Choreography Description Language (WS-CDL) describes and orchestrates the services interactions among multiple participants. WS-CDL verification is essential since the interactions would lead to mismatches. Existing works verify the messages ordering, the flow of messages, and the expected results from collaborations. In this paper, we present a Z specification of WS-CDL. Besides ve...
متن کاملInvestigation on Reliability Estimation of Loosely Coupled Software as a Service Execution Using Clustered and Non-Clustered Web Server
Evaluating the reliability of loosely coupled Software as a Service through the paradigm of a cluster-based and non-cluster-based web server is considered to be an important attribute for the service delivery and execution. We proposed a novel method for measuring the reliability of Software as a Service execution through load testing. The fault count of the model against the stresses of users ...
متن کاملSemantic Constraint and QoS-Aware Large-Scale Web Service Composition
Service-oriented architecture facilitates the running time of interactions by using business integration on the networks. Currently, web services are considered as the best option to provide Internet services. Due to an increasing number of Web users and the complexity of users’ queries, simple and atomic services are not able to meet the needs of users; and to provide complex services, it requ...
متن کاملCompetition, complementarity and service level guarantee in Web services
Network and processing overhead associated with web services is a significant challenge to its performance. As a result, web service providers often announce a service level agreement. This ensures that consumers, who pay for the service, can get the service at a given quality level. In this paper, we study the competition between two providers offering functionally the same web services, whe...
متن کاملWeb Service Providers\' Game on Price and Service Level
Response time is one of the critical web service quality dimensions. It refers to how long it takes that a web service responds to request of a user. In order to manage the response time, pricing schemes can work as an efficient access control mechanism. In this paper, we study competition between two providers offering functionally same web services where there is a monopoly service provider...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Int. J. Adv. Comp. Techn.
دوره 2 شماره
صفحات -
تاریخ انتشار 2010