Reference Hub1
Seamlessly Securing Web Services by a Signing Proxy

Seamlessly Securing Web Services by a Signing Proxy

Mario Jeckle, Ingo Melzer
Copyright: © 2004 |Volume: 1 |Issue: 3 |Pages: 13
ISSN: 1545-7362|EISSN: 1546-5004|ISSN: 1545-7362|EISBN13: 9781615204649|EISSN: 1546-5004|DOI: 10.4018/jwsr.2004070105
Cite Article Cite Article

MLA

Jeckle, Mario, and Ingo Melzer. "Seamlessly Securing Web Services by a Signing Proxy." IJWSR vol.1, no.3 2004: pp.88-100. http://doi.org/10.4018/jwsr.2004070105

APA

Jeckle, M. & Melzer, I. (2004). Seamlessly Securing Web Services by a Signing Proxy. International Journal of Web Services Research (IJWSR), 1(3), 88-100. http://doi.org/10.4018/jwsr.2004070105

Chicago

Jeckle, Mario, and Ingo Melzer. "Seamlessly Securing Web Services by a Signing Proxy," International Journal of Web Services Research (IJWSR) 1, no.3: 88-100. http://doi.org/10.4018/jwsr.2004070105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Web services offer a way for very different systems to collaborate independent of the programming language used or the involved operating systems. Their basis is the XML-based SOAP protocol, which can be used over any protocol that is able to transport a byte stream. Due to the fact that Web services do not depend on any operating system and there is no burden of a underlying paradigm, they are ideal for the integration of even completely inhomogeneous systems. However, SOAP does not (and does not have to) deal with security issues, which is nevertheless important for the involved systems. This article describes an add-on for existing Internet proxies to achieve user and developer transparent security features for Web services. This approach allows corporate firewalls to handle authentication. A first step is to add corporate signatures to all outgoing SOAP messages to enable a corporate trust relationship. A second improvement is to use proxy authentication as defined in RFC 2616 and RFC 2617 to add personal signatures assuming that the proxy has access to some key management system.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.