Abstract
This paper presents for the composition of software value a distributed data flow model as it is widely distributed over the internet. These services are ruled by user and they are connected to make a data processing system which is known as the megaservice. This distributed data flow model provides us the exchange of data directly among these services. This is completely different from central data flow model where the central hub for data traffic is the megaservice. This shows that this model that is distributed data flow model is better as compared to central data flow model in the sense of their performance and scalability. In distributed data flow model it fully use the network holding capacity for the free services and it also stops the blockage at the megaservices. The main aim of this paper is to develop web services and then apply the security over them.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Marchetto, A.: Special section on testing and security of Web systems, 14 Oct 2008
Satoh, F., Tokuda, T.: Security Policy Composition for Composite Web Services, Oct–Dec 2011
Eggen, E.: Norwegian Defense Research Establishment (FFI), Robust Web Services in Heterogeneous Military Networks, IEEE (2010)
Sachs, M. (arcus.sachs@verizon.com), Ahmad, D. (drma@mac.com): Splitting the HTTPS Stream to Attack Secure Web Connections, IEEE (2010)
Gruschka, N., Jensen, M., Member, IEEE, Luigi Lo Iacono, and Norbert Luttenberger, Server-Side Streaming Processing of WS-Security, Oct–Dec 2011
Saiedian, H.: Security Vulnerabilities in the Same-Origin Policy: Implications and Alternatives, University of Kansas, Sept 2011
Gaff, B.M., Smedinghoff T.J., Sor, S.: Privacy and Data Security, IEEE, 2012
Agarwal, A.: Implementation of Cylomatrix complexity matrix. J. Nat. Inspired Comput. 1(2), (2013)
Ather, D., Agarwal, D.K., Sharma, D., Saxena, D.K.: An Analysis and study of various web development platform in viewpoint of web developer. Acad. J. Online 2(11), (2013)
Fonseca, J., Vieira, M., Madeira, H.: Evaluation of Web Security Mechanisms Using Vulnerability and Attack Injection, Sept/Oct 2014
Antunes, N., Vieira, M.: Penetration Testing for Web Services, IEEE, 2014
Liu, W.M., Wang, L., Cheng, P., Ren, K.: Senior Member, IEEE, Shunzhi Zhu, and Mourad Debbabi, PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications, Nov/Dec 2014
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Saleem, A., Agarwal, A.K. (2016). Analysis and Design of Secure Web Services. In: Pant, M., Deep, K., Bansal, J., Nagar, A., Das, K. (eds) Proceedings of Fifth International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 437. Springer, Singapore. https://doi.org/10.1007/978-981-10-0451-3_41
Download citation
DOI: https://doi.org/10.1007/978-981-10-0451-3_41
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0450-6
Online ISBN: 978-981-10-0451-3
eBook Packages: EngineeringEngineering (R0)