Skip to main content

Security Concerns for Web Services and Applications

  • Conference paper
  • 454 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3818))

Abstract

In a secure system and for Web services specifically, security measure must be provided by implementers and system’s owner to support maximum level of trust relations by incorporating security product and technologies at all levels. In this paper we discuss some security issues concerning designing, implementing and deploying Web Services.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Fürst, K., Schmidt, T., Wippel, G.: Managing access in extended enterprise networks. In: Proceedings of IEEE Internet Computing (2002)

    Google Scholar 

  2. Pashalidis, A., Mitchell, C.J.: Imposter: A Singel Sign-On System for Use from Untrusted Devices. In: Proceedings of the EIRE Globecome 2004. EIRE Press, USA (2004)

    Google Scholar 

  3. Spillman, R.J.: Classical and Contemporary Cryptology. Pearson Prentice Hall, London (2005)

    Google Scholar 

  4. Stallings, W.: Cryptography and Network Security: Principles and Practice. Prentice Hall, Englewood Cliffs (2005)

    Google Scholar 

  5. Schwoon, S., Jha, S., Reps, T., Stubblebine, S.: On Generalized Authorization Problems. In: Proceedings 16th IEEE Computer Security Foundations Workshop, Asilomar, Pacific Grove, CA. June 30 - July 2, pp. 202–218 (2003)

    Google Scholar 

  6. Topchy, A., Punch, W.: Dimensionality Reduction via Genetic Value Clustering. In: Cantú-Paz, E., Foster, J.A., Deb, K., Davis, L., Roy, R., O’Reilly, U.-M., Beyer, H.-G., Kendall, G., Wilson, S.W., Harman, M., Wegener, J., Dasgupta, D., Potter, M.A., Schultz, A., Dowsland, K.A., Jonoska, N., Miller, J., Standish, R.K. (eds.) GECCO 2003. LNCS, vol. 2724, pp. 1431–1443. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Encheva, S., Tumin, S. (2005). Security Concerns for Web Services and Applications. In: Grumbach, S., Sui, L., Vianu, V. (eds) Advances in Computer Science – ASIAN 2005. Data Management on the Web. ASIAN 2005. Lecture Notes in Computer Science, vol 3818. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596370_28

Download citation

  • DOI: https://doi.org/10.1007/11596370_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30767-9

  • Online ISBN: 978-3-540-32249-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics