Skip to main content

On Secure Framework for Web Services in Untrusted Environment

  • Conference paper
Book cover On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops (OTM 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3762))

  • 716 Accesses

Abstract

In this paper we identify trust relationships among users and systems. We try to adhere to simplicity principle in our modelling of the system. By using simple model and free lightweight technologies, we show that it is possible to implement secure Web applications/services. The paper also addresses some security problems and issues about implementing Web Services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Albanese, J., Sonnenreich, W.: Network Security Illustrated. McGraw-Hill Professional, New York (2003)

    Google Scholar 

  2. Garfinkel, S.: Web Security, Privacy & Commerce. O’Reilly, Sebastopol (2002)

    Google Scholar 

  3. Geschwinde, E., Schönig, H.-J.: PostgreSQL, Developer’s Hadbook. Sams Publishing, USA (2001)

    Google Scholar 

  4. http://www.pubcookie.org

  5. http://www.pgpi.org

  6. Ferguson, N., Schneier, B.: Practical Cryptography. Wiley, Chichester (2003)

    Google Scholar 

  7. Fu, K., Sit, E., Smith, K., Feamster, N.: Dos and Don’ts of Client Authentication on the Web. In: Proceedings of the 10th USENIX Security Symposium, Washington, D.C. (August 2001)

    Google Scholar 

  8. Herzberg, A., Mass, Y., Mihaeli, J., Naor, D., Ravid, Y.: Access control meets public key infrastructure, or: Assigning roles to strangers. In: EIRE Symposium on security and privacy (2000)

    Google Scholar 

  9. Lu, Y., Wang, W., Xu, D., Bhargava, B.: Trust-based Privacy Preservation for Peer-to-peer Data Sharing. In: Proceedings of the 1st NSF/NSA/AFRL workshop on Secure Knowledge Management (SKM) (2004)

    Google Scholar 

  10. Pashalidis, A., Mitchell, C.J.: A taxonomy of single sign-on systems. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 249–264. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  11. Zimmermann, P.: Pretty Good Privacy User’s Guide, Distributed with the PGP software (1993)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Encheva, S., Tumin, S. (2005). On Secure Framework for Web Services in Untrusted Environment. In: Meersman, R., Tari, Z., Herrero, P. (eds) On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops. OTM 2005. Lecture Notes in Computer Science, vol 3762. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11575863_23

Download citation

  • DOI: https://doi.org/10.1007/11575863_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29739-0

  • Online ISBN: 978-3-540-32132-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics