Encyclopedia of Database Systems

2018 Edition
| Editors: Ling Liu, M. Tamer Özsu

Security Services

  • Athena VakaliEmail author
Reference work entry
DOI: https://doi.org/10.1007/978-1-4614-8265-9_1481


Authentication; Data confidentiality; Data integrity services


Given a set of local or distributed resources to be protected, a security service is a task (or set of tasks) that coherently performs processing or communication on behalf of the underlying system infrastructure, in order to support and employ several security requirements of both the system and the data sources. Such requirements involve authentication, PKI accessing, etc. over the underlying resources. Security services typically implement portions of security policies and are implemented via particular processes which are called security mechanisms.

Key Points

Security services are well documented and described in X.800 documentation [1] for almost all the layers from the physical up to the application layer, whereas focus on security services applied on the Web is given in [2]. Physical and data layer security services focus on support confidentiality at various levels, namely, at the connection and...

This is a preview of subscription content, log in to check access.

Recommended Reading

  1. 1.
    Recommendation X.800 Security architecture for open systems, interconnection for CCITT applications. http://fag.grm.hia.no/IKT7000/litteratur/paper/x800.pdf
  2. 2.
    Stoupa K, Vakali A. Policies for web security services, chapter III. In: Ferrari E, Thuraisingham B, editors. Web and information security: Idea Group; 2006.Google Scholar
  3. 3.
    Faisal M, Al-Muhtadi J, Al-Dhelaan A. Integrated protocols to ensure security services in wireless sensor networks. Int J Distrib Sensor Networks. 2013;9(7):740392.CrossRefGoogle Scholar
  4. 4.
    Kang J, Adibi S. A review of security protocols in mHealth wireless body area networks (WBAN). In: Proceedings of the International Conference on Future Network Systems and Security; 2015. p. 61–83.Google Scholar
  5. 5.
    Fouad MMM, Hassanien AE. Key pre-distribution techniques for WSN security services, vol. 70. 2014. p. 265–83.Google Scholar
  6. 6.
    Yeo S-S, Kim S-J, Cho D-E. Dynamic access control model for security client services in smart grid. Int J Distrib Sensor Networks. 2014;10(6):81760. 7 pagesCrossRefGoogle Scholar
  7. 7.
    Liang H, Huang D, Cai LX, Shen X, Peng D. Resource allocation for security services in mobile cloud computing. In: Proceedings of the IEEE Conference on Computer Communications Workshops; 2011.Google Scholar
  8. 8.
    Rosado DG, Fernández-Medina E, López J. Security services architecture for secure mobile grid systems. Spec Issue Secur Dependability Assur Software Archit. 2011;57(3):240–58.Google Scholar
  9. 9.
    Demchenko Y, De Laat C, Lopez DR, Garcia-Espin JA. Security services lifecycle management in on-demand infrastructure services provisioning. In: Proceedings of the 2nd IEEE International Conference on Cloud Computing Technology and Science; 30 Nov 2010–3 Dec 2010. p. 644, 650.Google Scholar
  10. 10.
    Shin S, Porras PA, Yegneswaran V, Fong MW, Gu G, Tyson M. FRESCO: modular composable security services for software-defined networks. In: Proceedings of the Network and Distributed Systems Security Symposium; 2013.Google Scholar
  11. 11.
    Sheng QZ, Qiao X, Vasilakos AV, Szabo C, Bourne S, Xu X. Web services composition: a decade’s overview. Inf Sci. 2014;280(Oct):218–38.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Aristotle UniversityThessalonikiGreece

Section editors and affiliations

  • Elena Ferrari
    • 1
  1. 1.DISTAUniversità degli Studi dell’InsubriaVareseItaly