메뉴 건너뛰기




Volumn , Issue , 2014, Pages 464-471

Service security revisited

Author keywords

REST; Security; Services; SOA; SOAP

Indexed keywords

INFORMATION SERVICES; SERVICE ORIENTED ARCHITECTURE (SOA); SOAPS (DETERGENTS); STANDARDIZATION; WEBSITES;

EID: 84919625923     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SCC.2014.68     Document Type: Conference Paper
Times cited : (8)

References (52)
  • 4
    • 67049129622 scopus 로고    scopus 로고
    • Web services security: Soap message security 1.1
    • A. Nadalin, C. Kaler, R. Monzillo, and H.-B. Phillip, "Web Services Security: SOAP Message Security 1.1," OASIS, Standard Specification, 2006. [Online]. Available: http://docs.oasis-open.org/wss/v1.1/wss-v1. 1-spec-os-SOAPMessageSecurity.pdf
    • (2006) OASIS, Standard Specification
    • Nadalin, A.1    Kaler, C.2    Monzillo, R.3    Phillip, H.-B.4
  • 6
    • 70450184286 scopus 로고    scopus 로고
    • The transport layer security (tls) protocol version 1.2
    • T. Dierks and E. Rescorla, "The Transport Layer Security (TLS) Protocol Version 1.2," IETF, RFC 5246, 2008. [Online]. Available: http://www.ietf.org/rfc/rfc5246.txt
    • (2008) IETF, RFC , vol.5246
    • Dierks, T.1    Rescorla, E.2
  • 7
    • 84895539842 scopus 로고    scopus 로고
    • The oauth 2.0 authorization framework
    • D. Hardt, "The OAuth 2.0 Authorization Framework," IETF, RFC 6749, 2012. [Online]. Available: https://tools.ietf.org/html/rfc6749
    • (2012) IETF, RFC , vol.6749
    • Hardt, D.1
  • 8
    • 78650118674 scopus 로고    scopus 로고
    • The oauth 1.0 protocol
    • E. Hammer-Lahav, "The OAuth 1.0 Protocol," IETF, RFC 5849, 2010. Available: https://tools.ietf.org/html/rfc5849
    • (2010) IETF, RFC , vol.5849
    • Hammer-Lahav, E.1
  • 9
    • 84919614372 scopus 로고    scopus 로고
    • IETF Javascript Object Signing and Encryption (jose) 2014
    • IETF, "Javascript Object Signing and Encryption (jose)," 2014. Available: http://datatracker.ietf.org/wg/jose/
  • 13
    • 77952493943 scopus 로고    scopus 로고
    • Web services federation language (wsfederation) version 1.2
    • M. Goodner and A. Nadalin, "Web Services Federation Language (WSFederation) Version 1.2," OASIS, Standard, 2009. [Online]. Available: http://docs.oasis-open.org/wsfed/federation/v1.2/ws-federation.html
    • (2009) OASIS, Standard
    • Goodner, M.1    Nadalin, A.2
  • 14
    • 84919635357 scopus 로고    scopus 로고
    • EXtensible access control markup language (xacml) version 3.0
    • E. Rissanen, "eXtensible Access Control Markup Language (XACML) Version 3.0," OASIS, Standard, 2013. [Online]. Available: http: //www.oasis-open.org/committees/xacml
    • (2013) OASIS, Standard
    • Rissanen, E.1
  • 15
    • 33746205188 scopus 로고    scopus 로고
    • Assertions and protocols for the oasis security assertion markup language (saml) v2.0
    • S. Cantor, J. Kemp, R. Philpott, and E. Maler, "Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0," OASIS, Standard, 2005. [Online]. Available: http: //docs.oasis-open.org/security/saml/v2.0/saml-2.0-os.zip
    • (2005) OASIS, Standard
    • Cantor, S.1    Kemp, J.2    Philpott, R.3    Maler, E.4
  • 17
    • 0043026142 scopus 로고    scopus 로고
    • XML signature syntax and processing (second edition)
    • M. Bartel, J. Boyer, B. Fox, B. LaMacchia, and E. Simon, "XML Signature Syntax and Processing (Second Edition)," W3C, Recommendation, 2008. [Online]. Available: http://www.w3.org/TR/ xmldsig-core/
    • (2008) W3C, Recommendation
    • Bartel, M.1    Boyer, J.2    Fox, B.3    Lamacchia, B.4    Simon, E.5
  • 18
    • 70349313758 scopus 로고    scopus 로고
    • XML key management specification (xkms 2.0)
    • P. Hallam-Baker and H. M. Shivaram, "XML Key Management Specification (XKMS 2.0)," W3C, Recommendation, 2005. [Online]. Available: http://www.w3.org/TR/xkms2/
    • (2005) W3C, Recommendation
    • Hallam-Baker, P.1    Shivaram, H.M.2
  • 24
    • 78650878882 scopus 로고    scopus 로고
    • Simple mail transfer protocol
    • J. Klensin, "Simple Mail Transfer Protocol," IETF, RFC 5321, 2008. Available: https://tools.ietf.org/html/rfc5321
    • (2008) IETF, RFC , vol.5321
    • Klensin, J.1
  • 27
    • 84861307113 scopus 로고    scopus 로고
    • The nist definition of cloud computing
    • Special Publication 800-145
    • P. Mell and T. Grance, "The NIST Definition of Cloud Computing," NIST, Special Publication 800-145, 2011. [Online]. Available: http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
    • (2011) NIST
    • Mell, P.1    Grance, T.2
  • 28
    • 35148894664 scopus 로고    scopus 로고
    • Service oriented architecture for e-health support services based on grid computing overlay
    • ser. SCC'06. Chicago, IL, USA: IEEE
    • W. M. Omar and A. Taleb-Bendiab, "Service Oriented Architecture for E-health Support Services Based on Grid Computing Overlay," in IEEE International Conference on Services Computing, ser. SCC'06. Chicago, IL, USA: IEEE, 2006, pp. 135-142. [Online]. Available: http://dx.doi.org/10.1109/SCC.2006.90
    • (2006) IEEE International Conference on Services Computing , pp. 135-142
    • Omar, W.M.1    Taleb-Bendiab, A.2
  • 29
    • 84881074771 scopus 로고    scopus 로고
    • ETIS-efficient trust and identity management system for federated service providers
    • ser. AINA'13, L. Barolli, F. Xhafa, M. Takizawa, T. Enokido, and H.-H. Hsu, Eds. Barcelona, Catalonia, Spain: IEEE
    • M. V. Bhonsle, N. Poolsappasit, and S. K. Madria, "ETIS-Efficient Trust and Identity Management System for Federated Service Providers," in IEEE 27th International Conference on Advanced Information Networking and Applications, ser. AINA'13, L. Barolli, F. Xhafa, M. Takizawa, T. Enokido, and H.-H. Hsu, Eds. Barcelona, Catalonia, Spain: IEEE, 2013, pp. 219-226. [Online]. Available: http://dx.doi.org/10.1109/AINA.2013.13
    • (2013) IEEE 27th International Conference on Advanced Information Networking and Applications , pp. 219-226
    • Bhonsle, M.V.1    Poolsappasit, N.2    Madria, S.K.3
  • 31
    • 84919614364 scopus 로고    scopus 로고
    • OWASP XML External Entity (XXE) Processing 2013
    • OWASP, "XML External Entity (XXE) Processing," 2013. Available: https://www.owasp.org/index.php/XML External Entity (XXE) Processing
  • 32
    • 0003213919 scopus 로고    scopus 로고
    • XML path language (xpath) version 1.0
    • J. Clark and S. DeRose, "XML Path Language (XPath) Version 1.0," W3C, Recommendation, 1999. [Online]. Available: http: //www.w3.org/TR/xpath
    • (1999) W3C, Recommendation
    • Clark, J.1    Derose, S.2
  • 33
    • 84919614363 scopus 로고    scopus 로고
    • OWASP XPATH Injection 2013
    • OWASP, "XPATH Injection," 2013. [Online]. Available: https: //www.owasp.org/index.php/XPATH Injection
  • 34
    • 77954328275 scopus 로고    scopus 로고
    • XML signature element wrapping attacks and countermeasures
    • ser. SWS '05. New York, NY, USA: ACM
    • M. McIntosh and P. Austel, "XML Signature Element Wrapping Attacks and Countermeasures," in Proceedings of the 2005 Workshop on Secure Web Services, ser. SWS '05. New York, NY, USA: ACM, 2005, pp. 20-27. [Online]. Available: http://doi.acm.org/10.1145/1103022.1103026
    • (2005) Proceedings of the 2005 Workshop on Secure Web Services , pp. 20-27
    • McIntosh, M.1    Austel, P.2
  • 35
    • 70449472667 scopus 로고    scopus 로고
    • Vulnerable cloud: Soap message security validation revisited
    • ser. ICWS'09, E. Damiani, R. Chang, and J. Zhang, Eds. Los Angeles, CA, USA: IEEE
    • N. Gruschka and L. Lo Iacono, "Vulnerable Cloud: SOAP Message Security Validation Revisited," in IEEE International Conference on Web Services, ser. ICWS'09, E. Damiani, R. Chang, and J. Zhang, Eds. Los Angeles, CA, USA: IEEE, 2009, pp. 625-631. [Online]. Available: http://dx.doi.org/10.1109/ICWS.2009.70
    • (2009) IEEE International Conference on Web Services , pp. 625-631
    • Gruschka, N.1    Lo Iacono, L.2
  • 37
    • 84904705463 scopus 로고    scopus 로고
    • Making xml signatures immune to xml signature wrapping attacks
    • ser. Communications in Computer and Information Science, I. Ivanov, M. Sinderen, F. Leymann, and T. Shan, Eds. Springer International Publishing
    • C. Mainka, M. Jensen, L. Lo Iacono, and J. Schwenk, "Making XML Signatures Immune to XML Signature Wrapping Attacks," in Cloud Computing and Services Science, ser. Communications in Computer and Information Science, I. Ivanov, M. Sinderen, F. Leymann, and T. Shan, Eds. Springer International Publishing, 2013, vol. 367, pp. 151-167. Available: http://dx.doi.org/10.1007/978-3-319-04519-1 10
    • (2013) Cloud Computing and Services Science , vol.367 , pp. 151-167
    • Mainka, C.1    Jensen, M.2    Iacono, L.L.3    Schwenk, J.4
  • 38
    • 21244454934 scopus 로고    scopus 로고
    • Uniform resource identifier (uri): Generic syntax
    • T. Berners-Lee, R. Fielding, and L. Masinter, "Uniform Resource Identifier (URI): Generic Syntax," IETF, RFC 3986, 2005. [Online]. Available: http://www.ietf.org/rfc/rfc3986.txt
    • (2005) IETF, RFC , vol.3986
    • Berners-Lee, T.1    Fielding, R.2    Masinter, L.3
  • 39
    • 84919614362 scopus 로고    scopus 로고
    • Mozilla Developer Network Persona 2013
    • Mozilla Developer Network, "Persona," 2013. [Online]. Available: https://developer.mozilla.org/en-US/Persona
  • 40
    • 70450170255 scopus 로고    scopus 로고
    • The application/json media type for javascript object notation (json)
    • D. Crockford, "The application/json Media Type for JavaScript Object Notation (JSON)," IETF, RFC 4627, 2006. [Online]. Available: http://www.ietf.org/rfc/rfc4627.txt
    • (2006) IETF, RFC , vol.4627
    • Crockford, D.1
  • 41
    • 84864069043 scopus 로고    scopus 로고
    • On using json-ld to create evolvable restful services
    • ser. WS-REST '12. New York, NY, USA: ACM
    • M. Lanthaler and C. Gutl, "On Using JSON-LD to Create Evolvable RESTful Services," in Proceedings of the Third International Workshop on RESTful Design, ser. WS-REST '12. New York, NY, USA: ACM, 2012, pp. 25-32. [Online]. Available: http: //doi.acm.org/10.1145/2307819.2307827
    • (2012) Proceedings of the Third International Workshop on RESTful Design , pp. 25-32
    • Lanthaler, M.1    Gutl, C.2
  • 42
    • 84919614361 scopus 로고    scopus 로고
    • JSON web encryption (jwe)
    • M. Jones, E. Rescorla, and J. Hildebrand, "JSON Web Encryption (JWE)," IETF, Internet-Draft, 2014. [Online]. Available: http://tools. ietf.org/html/draft-ietf-jose-json-web-encryption-25
    • (2014) IETF, Internet-Draft
    • Jones, M.1    Rescorla, E.2    Hildebrand, J.3
  • 43
    • 85022329867 scopus 로고    scopus 로고
    • JSON web signature (jws)
    • M. Jones, J. Bradley, and N. Sakimura, "JSON Web Signature (JWS)," IETF, Internet-Draft, 2014. [Online]. Available: http://tools.ietf.org/ html/draft-ietf-jose-json-web-signature-25
    • (2014) IETF, Internet-Draft
    • Jones, M.1    Bradley, J.2    Sakimura, N.3
  • 44
    • 84919614359 scopus 로고    scopus 로고
    • JSON web algorithms (jwa)
    • M. Jones, "JSON Web Algorithms (JWA)," IETF, Internet-Draft, 2014. [Online]. Available: http://tools.ietf.org/html/ draft-ietf-jose-json-web-algorithms-25
    • (2014) IETF, Internet-Draft
    • Jones, M.1
  • 45
    • 84919614358 scopus 로고    scopus 로고
    • JSON web key (jwk)
    • M. Jones, "JSON Web Key (JWK)," IETF, Internet-Draft, 2014. [Online]. Available: http://tools.ietf.org/html/ draft-ietf-jose-json-web-key-25
    • (2014) IETF, Internet-Draft
    • Jones, M.1
  • 48
    • 84869593649 scopus 로고    scopus 로고
    • In search of an internet of things service architecture: Rest or ws-A developers' perspective
    • ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, A. Puiatti and T. Gu, Eds. Springer Berlin Heidelberg
    • D. Guinard, I. Ion, and S. Mayer, "In Search of an Internet of Things Service Architecture: REST or WS-? A Developers' Perspective," in Mobile and Ubiquitous Systems: Computing, Networking, and Services, ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, A. Puiatti and T. Gu, Eds., vol. 104. Springer Berlin Heidelberg, 2012, pp. 326-337. Available: http://dx.doi.org/10.1007/978-3-642-30973-1 32
    • (2012) Mobile and Ubiquitous Systems: Computing, Networking, and Services , vol.104 , pp. 326-337
    • Guinard, D.1    Ion, I.2    Mayer, S.3
  • 49
    • 84919614356 scopus 로고    scopus 로고
    • Web cryptography api
    • R. Sleevi and D. Dahl, "Web Cryptography API," W3C, Working Draft, 2013. [Online]. Available: http://www.w3.org/TR/WebCryptoAPI
    • (2013) W3C, Working Draft
    • Sleevi, R.1    Dahl, D.2
  • 50
    • 84866375929 scopus 로고    scopus 로고
    • Enabling message security for restful services
    • ser. ICWS'12. Honolulu, USA: IEEE, June 24-29, 2012
    • G. Serme, A. S. De Oliveira, and R. Y. Massiera, Julien, "Enabling message security for RESTful services," in 19th IEEE International Conference on Web Services, ser. ICWS'12. Honolulu, USA: IEEE, June 24-29, 2012, 2012. [Online]. Available: http: //www.eurecom.fr/publication/3739
    • (2012) 19th IEEE International Conference on Web Services
    • Serme, G.1    De Oliveira, A.S.2    Massiera, J.R.Y.3
  • 51
    • 84919614355 scopus 로고    scopus 로고
    • Amazon Signing and Authenticating REST Requests 2006
    • Amazon, "Signing and Authenticating REST Requests," 2006. Available: http://docs.aws.amazon.com/AmazonS3/latest/dev/ RESTAuthentication.html
  • 52
    • 84919614354 scopus 로고    scopus 로고
    • HTTP signatures
    • M. Cavage and M. Sporny, "HTTP Signatures," IETF, Internet-Draft, 2013. [Online]. Available: http://tools.ietf.org/html/ draft-cavage-http-signatures-01
    • (2013) IETF, Internet-Draft
    • Cavage, M.1    Sporny, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.