Analyzing Web Services Security Against FEA TRM Enterprise Security Criteria
نویسنده
چکیده
................................................................................................................2 Scope and Limitations...........................................................................................4 Web Services Security Analysis versus Enterprise Security Criteria ....................5 1. Wired FEA Web Services Security and FEA, EA Enterprise Security Architecture:...................................................................................... ...................5 2. E-Authentication Common Services .................................................................5 3. Single Sign On through the Portal.....................................................................7 4. Access Control by Requestor Application and Transaction Services................8 5. Confidentiality ...................................................................................................9 6. Secure Audit ...................................................................................................11 7. Availability.......................................................................................................11 8. Security management—risk management. .....................................................12 Conclusion ..........................................................................................................13 Appendix A: Enterprise Security Criteria.............................................................14 References .........................................................................................................17
منابع مشابه
Selecting Web Services with Security Compliances: A Managerial Perspective
This paper proposes a framework of a decision support system (DSS) for the assessment process of selecting Web services with security compliances consistent with the enterprise business goal. The proposed DSS framework is a systematic assessment model which could aid IS managers in making decision on which Web services would most likely meet the security requirements of their information system...
متن کاملModeling the Evaluation Criteria for Security Patterns in Web Service Discovery
Current trends in performing business-to-business transactions and enterprise application integration have been extended to the use of web service. With web services being accepted and deployed in both research and industrial areas, the security related issues become important. Web services security has attracted the attention of researchers in the area of security due to the proven fact that m...
متن کاملModeling the Evaluation Criteria for Security Patterns in Web Service Discovery
Current trends in performing business-to-business transactions and enterprise application integration have been extended to the use of web service. With web services being accepted and deployed in both research and industrial areas, the security related issues become important. Web services security has attracted the attention of researchers in the area of security due to the proven fact that m...
متن کاملSecure SOAP Requests in Enterprise SOA
Web service specifications (WS*) have been designed with the aim of being composable to provide a rich set of tools for secure, reliable, and/or transacted web services. Due to the flexibility of SOAP-level security [1] mechanisms, web services may be vulnerable to a distinct class of attacks based on the malicious interception, manipulation, and transmission of SOAP messages, which are referre...
متن کاملImage flip CAPTCHA
The massive and automated access to Web resources through robots has made it essential for Web service providers to make some conclusion about whether the "user" is a human or a robot. A Human Interaction Proof (HIP) like Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) offers a way to make such a distinction. CAPTCHA is a reverse Turing test used by Web serv...
متن کامل