Advertisement

Analysis and Design of Secure Web Services

  • Ambreen Saleem
  • Ambuj Kumar Agarwal
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 437)

Abstract

This paper presents for the composition of software value a distributed data flow model as it is widely distributed over the internet. These services are ruled by user and they are connected to make a data processing system which is known as the megaservice. This distributed data flow model provides us the exchange of data directly among these services. This is completely different from central data flow model where the central hub for data traffic is the megaservice. This shows that this model that is distributed data flow model is better as compared to central data flow model in the sense of their performance and scalability. In distributed data flow model it fully use the network holding capacity for the free services and it also stops the blockage at the megaservices. The main aim of this paper is to develop web services and then apply the security over them.

Keywords

Service appealer Service dispenser Prosumer Web archive 

References

  1. 1.
    Marchetto, A.: Special section on testing and security of Web systems, 14 Oct 2008Google Scholar
  2. 2.
    Satoh, F., Tokuda, T.: Security Policy Composition for Composite Web Services, Oct–Dec 2011Google Scholar
  3. 3.
    Eggen, E.: Norwegian Defense Research Establishment (FFI), Robust Web Services in Heterogeneous Military Networks, IEEE (2010)Google Scholar
  4. 4.
    Sachs, M. (arcus.sachs@verizon.com), Ahmad, D. (drma@mac.com): Splitting the HTTPS Stream to Attack Secure Web Connections, IEEE (2010)Google Scholar
  5. 5.
    Gruschka, N., Jensen, M., Member, IEEE, Luigi Lo Iacono, and Norbert Luttenberger, Server-Side Streaming Processing of WS-Security, Oct–Dec 2011Google Scholar
  6. 6.
    Saiedian, H.: Security Vulnerabilities in the Same-Origin Policy: Implications and Alternatives, University of Kansas, Sept 2011Google Scholar
  7. 7.
    Gaff, B.M., Smedinghoff T.J., Sor, S.: Privacy and Data Security, IEEE, 2012Google Scholar
  8. 8.
    Agarwal, A.: Implementation of Cylomatrix complexity matrix. J. Nat. Inspired Comput. 1(2), (2013)Google Scholar
  9. 9.
    Ather, D., Agarwal, D.K., Sharma, D., Saxena, D.K.: An Analysis and study of various web development platform in viewpoint of web developer. Acad. J. Online 2(11), (2013)Google Scholar
  10. 10.
    Fonseca, J., Vieira, M., Madeira, H.: Evaluation of Web Security Mechanisms Using Vulnerability and Attack Injection, Sept/Oct 2014Google Scholar
  11. 11.
    Antunes, N., Vieira, M.: Penetration Testing for Web Services, IEEE, 2014Google Scholar
  12. 12.
    Liu, W.M., Wang, L., Cheng, P., Ren, K.: Senior Member, IEEE, Shunzhi Zhu, and Mourad Debbabi, PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications, Nov/Dec 2014Google Scholar
  13. 13.

Copyright information

© Springer Science+Business Media Singapore 2016

Authors and Affiliations

  1. 1.College of Computing Sciences and Information TechnologyTeerthanker Mahaveer UniversityMoradabadIndia

Personalised recommendations