Abstract
In a secure system and for Web services specifically, security measure must be provided by implementers and system’s owner to support maximum level of trust relations by incorporating security product and technologies at all levels. In this paper we discuss some security issues concerning designing, implementing and deploying Web Services.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Fürst, K., Schmidt, T., Wippel, G.: Managing access in extended enterprise networks. In: Proceedings of IEEE Internet Computing (2002)
Pashalidis, A., Mitchell, C.J.: Imposter: A Singel Sign-On System for Use from Untrusted Devices. In: Proceedings of the EIRE Globecome 2004. EIRE Press, USA (2004)
Spillman, R.J.: Classical and Contemporary Cryptology. Pearson Prentice Hall, London (2005)
Stallings, W.: Cryptography and Network Security: Principles and Practice. Prentice Hall, Englewood Cliffs (2005)
Schwoon, S., Jha, S., Reps, T., Stubblebine, S.: On Generalized Authorization Problems. In: Proceedings 16th IEEE Computer Security Foundations Workshop, Asilomar, Pacific Grove, CA. June 30 - July 2, pp. 202–218 (2003)
Topchy, A., Punch, W.: Dimensionality Reduction via Genetic Value Clustering. In: Cantú-Paz, E., Foster, J.A., Deb, K., Davis, L., Roy, R., O’Reilly, U.-M., Beyer, H.-G., Kendall, G., Wilson, S.W., Harman, M., Wegener, J., Dasgupta, D., Potter, M.A., Schultz, A., Dowsland, K.A., Jonoska, N., Miller, J., Standish, R.K. (eds.) GECCO 2003. LNCS, vol. 2724, pp. 1431–1443. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Encheva, S., Tumin, S. (2005). Security Concerns for Web Services and Applications. In: Grumbach, S., Sui, L., Vianu, V. (eds) Advances in Computer Science – ASIAN 2005. Data Management on the Web. ASIAN 2005. Lecture Notes in Computer Science, vol 3818. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596370_28
Download citation
DOI: https://doi.org/10.1007/11596370_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30767-9
Online ISBN: 978-3-540-32249-8
eBook Packages: Computer ScienceComputer Science (R0)