Abstract
XKMS (XML Key Management Specification), one of web services security specification, defines the protocol for distributing and registering public keys for verifying digital signatures and enciphering XML documents of web service applications with various and complicate functions. In this paper, we propose XKMS-based streamlining PKI service model and design protocol component based on standard specification. Also describes the analysis and security method of PKI service for secure web services, paying attention to the features of XML based security service. This service model offers the security construction guideline for future global web services frameworks.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
W3C Note: XML Key Management(XKMS 2.0) Requirements (2003)
W3C Working Draft: XML Key Management Specification Version 2.0. (2003)
W3C/IETF Recommendation: XML-Signature Syntax and Processing (2002)
W3C Recommendation: XML Encryption Syntax and Processing (2003)
RFC 2459: X.509 Certificate and CRL Profile (1999)
RFC 2510: Certificate Management Protocol (1999)
A Delphi Group: Web Services 2002:Market Milestone Report. A Delphi Group White Paper. IBM (2002)
Holbrook, S.: Web Services Architecture-Technical Overview of the Pieces. IBM (2002)
Roh, J., Jin, S., Lee, K.: Certificate Path Construction and Validation in CVS. KICS-Korea IT Forum (2002)
OASIS: Web Service Security (2002), http://www-106.ibm.com/
Munoz, J.L., et al.: Using OCSP to Secure Certificate-Using Transactions in M-commerce. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 280–292. Springer, Heidelberg (2003)
Park, N., et al.: Development of XKMS-Based Service Component for Using PKI in XML Web Services Environment. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 784–791. Springer, Heidelberg (2004)
Lee, S.-M., et al.: TY*SecureWS:An Integrated Web Service Security Solution Based on Java. In: Bauknecht, K., Tjoa, A.M., Quirchmayr, G. (eds.) EC-Web 2003. LNCS, vol. 2738, pp. 186–195. Springer, Heidelberg (2005)
Jeong, Y., et al.: A Trusted Key Management Scheme for Digital Rights Management. ETRI Journal 27(1), 114–117 (2005)
Elliott, S.J.: fferentiation of Signature Traits vis-à-vis Mobile- and Table- Based Digitizers. ETRI Journal 26(6), 641–646 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, N., Moon, K., Jang, J., Sohn, S., Won, D. (2005). Implementation of Streamlining PKI System for Web Services. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3480. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424758_64
Download citation
DOI: https://doi.org/10.1007/11424758_64
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25860-5
Online ISBN: 978-3-540-32043-2
eBook Packages: Computer ScienceComputer Science (R0)