Skip to main content

SOA Security Aspects in Web-based Architectural Design

  • Chapter

Abstract

Distributed web-based applications have been progressively increasing in number and scale over the past decades. There is an intensification of the need for security frameworks in the era of web-based applications when wc refer to distributed tclcmcdicinc interoperability architectures. In contrast. Service Oriented Architecture (SOA) is gaining popularity day by day when wc specially consider the web applications. SOA is playing a major role to maintain the security standards of distributed applications. This paper proposes a secure web-based architectural design by using the standards of SOA for distributed web application that maintains the interoperability and data integration through certain secure channels. Wc have created CRUD (Create, Read, Update, Delete) operations that has an implication on our own created web services and wc propose a secure architecture that is implemented on CRUD operations.

The paper provides an extensive description of the prevention of replay attacks and a detailed explanation for applying security measures.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Apache. Apache Axis, Accessed December. 24, 2009 [Online], http://ws.apache.org/ axis.

    Google Scholar 

  2. Apache. Apache WSS4J, Accessed December. 24, 2009 [Online], http://ws.apache.org/ wss4j.

    Google Scholar 

  3. G. S. Bob Atkinson, et al. Web services security (ws-security), copyright 2002–2002 international business machines corporation, microsoft corporation, Accessed Decem-ber. 24, 2009 [Online], http://www.cgisecurity.com/ws/ws-secure.pdf.

    Google Scholar 

  4. R. Bunge, S. Chung, B. Endicott-Popovsky, and D. McLane. An operational framework for service oriented architecture network security. In HICSS’ 08: Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences, page 312, Washington, DC, USA, 2008. IEEE Computer Society.

    Google Scholar 

  5. X. Chen, G. Huang, and H. Mei. Towards automatic verification of web-based soa applications. In APWeb, pages 528–536, 2008.

    Google Scholar 

  6. N. A. Delessy and E. B. Fernandez. A pattern-driven security process for soa applications. Availability. Reliability and Security. International Conference on, 0:416–421, 2008.

    Article  Google Scholar 

  7. X. Larrucea and R. Alonso. ISOAS: Through an independent SOA security specification. In Proceedings of the Seventh International Conference on Composition-Based Software Systems (ICCBSS 2008), pages 92–100. IEEE Computer Society, 2008.

    Google Scholar 

  8. W. M. Omar and A. Talcb-Bcndiab. Service oriented architecture for e-health support services based on grid computing over. Services Computing. IEEE International Conference on, 0:135–142, 2006.

    Google Scholar 

  9. C. Phan. Service Oriented Architecture (SOA)-Security Challenges and Mitigation Strategies. In IEEE Military Communications Conference, 2007. MILCOM 2007, pages 1–7, 2007.

    Google Scholar 

  10. F. Satoh, Y. Nakamura, N. K. Mukhi, M. Tatsubori, and K. Ono. Methodology and tools for end-to-end soa security configurations. In SERVICES’ 08: Proceedings of the 2008 IEEE Congress on Services — Part I, pages 307–314, Washington, DC, USA, 2008. IEEE Computer Society.

    Google Scholar 

  11. A. Shaikh, M. Memon, N. Memon, and M. Misbalmddin. The role of service oriented architecture in telemedicine healthcare system. Complex. Intelligent and Software Intensive Systems. International Conference, 0:208–214, 2009.

    Google Scholar 

  12. A. Shaikh, M. Misbalmddin, and M. S. Memon. A system design for a telemedicine health care system. In IMTIC, pages 295–305, 2008.

    Google Scholar 

  13. A. Shaikh, A. Soomro, S. Ali, and N. Memon. The security aspects in web-based architectural design using service oriented architecture. In 13th International Conference on Information Visualisation. IV 09, 15–17 July 2009, Barcelona, Spain, pages 461–466, 2009.

    Google Scholar 

  14. H. Yamany and M. Capretz. Use of Data Mining to Enhance Security for SOA. In Convergence and Hybrid Information Technology, 2008. ICCIT’08. Third International Conference, on, volume 1, 2008.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag/Wien

About this chapter

Cite this chapter

Shaikh, A., Ali, S., Memon, N., Karampelas, P. (2010). SOA Security Aspects in Web-based Architectural Design. In: Memon, N., Alhajj, R. (eds) From Sociology to Computing in Social Networks. Springer, Vienna. https://doi.org/10.1007/978-3-7091-0294-7_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-7091-0294-7_22

  • Publisher Name: Springer, Vienna

  • Print ISBN: 978-3-7091-0293-0

  • Online ISBN: 978-3-7091-0294-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics