Skip to main content

Implementation of Streamlining PKI System for Web Services

  • Conference paper
Computational Science and Its Applications – ICCSA 2005 (ICCSA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3480))

Included in the following conference series:

  • 957 Accesses

Abstract

XKMS (XML Key Management Specification), one of web services security specification, defines the protocol for distributing and registering public keys for verifying digital signatures and enciphering XML documents of web service applications with various and complicate functions. In this paper, we propose XKMS-based streamlining PKI service model and design protocol component based on standard specification. Also describes the analysis and security method of PKI service for secure web services, paying attention to the features of XML based security service. This service model offers the security construction guideline for future global web services frameworks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. W3C Note: XML Key Management(XKMS 2.0) Requirements (2003)

    Google Scholar 

  2. W3C Working Draft: XML Key Management Specification Version 2.0. (2003)

    Google Scholar 

  3. W3C/IETF Recommendation: XML-Signature Syntax and Processing (2002)

    Google Scholar 

  4. W3C Recommendation: XML Encryption Syntax and Processing (2003)

    Google Scholar 

  5. RFC 2459: X.509 Certificate and CRL Profile (1999)

    Google Scholar 

  6. RFC 2510: Certificate Management Protocol (1999)

    Google Scholar 

  7. A Delphi Group: Web Services 2002:Market Milestone Report. A Delphi Group White Paper. IBM (2002)

    Google Scholar 

  8. Holbrook, S.: Web Services Architecture-Technical Overview of the Pieces. IBM (2002)

    Google Scholar 

  9. Roh, J., Jin, S., Lee, K.: Certificate Path Construction and Validation in CVS. KICS-Korea IT Forum (2002)

    Google Scholar 

  10. OASIS: Web Service Security (2002), http://www-106.ibm.com/

  11. Munoz, J.L., et al.: Using OCSP to Secure Certificate-Using Transactions in M-commerce. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 280–292. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  12. Park, N., et al.: Development of XKMS-Based Service Component for Using PKI in XML Web Services Environment. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 784–791. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  13. Lee, S.-M., et al.: TY*SecureWS:An Integrated Web Service Security Solution Based on Java. In: Bauknecht, K., Tjoa, A.M., Quirchmayr, G. (eds.) EC-Web 2003. LNCS, vol. 2738, pp. 186–195. Springer, Heidelberg (2005)

    Google Scholar 

  14. Jeong, Y., et al.: A Trusted Key Management Scheme for Digital Rights Management. ETRI Journal 27(1), 114–117 (2005)

    Article  Google Scholar 

  15. Elliott, S.J.: fferentiation of Signature Traits vis-à-vis Mobile- and Table- Based Digitizers. ETRI Journal 26(6), 641–646 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Park, N., Moon, K., Jang, J., Sohn, S., Won, D. (2005). Implementation of Streamlining PKI System for Web Services. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3480. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424758_64

Download citation

  • DOI: https://doi.org/10.1007/11424758_64

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25860-5

  • Online ISBN: 978-3-540-32043-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics