CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Web Services Security: Threats and Challenges

by Sunny Kumar, Sanjeev Srivastava, Amandeep Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Number 18
Year of Publication: 2015
Authors: Sunny Kumar, Sanjeev Srivastava, Amandeep Singh
10.5120/20657-3293

Sunny Kumar, Sanjeev Srivastava, Amandeep Singh . Web Services Security: Threats and Challenges. International Journal of Computer Applications. 117, 18 ( May 2015), 32-35. DOI=10.5120/20657-3293

@article{ 10.5120/20657-3293,
author = { Sunny Kumar, Sanjeev Srivastava, Amandeep Singh },
title = { Web Services Security: Threats and Challenges },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 117 },
number = { 18 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 32-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume117/number18/20657-3293/ },
doi = { 10.5120/20657-3293 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:59:45.763912+05:30
%A Sunny Kumar
%A Sanjeev Srivastava
%A Amandeep Singh
%T Web Services Security: Threats and Challenges
%J International Journal of Computer Applications
%@ 0975-8887
%V 117
%N 18
%P 32-35
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

One of the leading developments nowadays within distributed computing is Web Services. Essentially, a Web Service can easily be characterized as an XML structured interface that can easily be utilized by a client program to conjure a computing solution dispersed within a network by means of standard Internet protocols. In order for Web Services to turned out to be a widely used approach for the program to program communication, although, there necessity to be a reliable framework in place for exactly how Web Services that makes use of the general public Internet for transport can be appropriately safeguarded as well as secured. As the circumstances seems nowadays, the majority of services are not really openly revealed however they are frequently implemented within a corporate and business, exclusive network. This hinders the visualization of Web Services that can be openly published in directories which prospective consumers can browse to discover an appropriate service to gratify their particular requirement. This paper explains exactly what the standard threats and obstacles can be found in implementing secured Web Services over openly available and vulnerable networks, as they are described within the literature. It then proceeds to present an introduction to a few of the additional acknowledged security guidelines which happen to be starting to come through around.

References
  1. http://www. w3. org/TR/2003/REC-soap12-part0-20030624/- L1161. . .
  2. Microsoft Patterns and Practices: Building Secure ASP. NET Applications, Microsoft Press, January 2003.
  3. W3C Note, Web Services Description Language (WSDL) 1. 1, 15 March 2001, http://www. w3. org/TR/2001/NOTE-wsdl-20010315/
  4. S. Suriadi, A. Clark, and D. Schmidt, "Validating denial of service vulnerabilities in web services," in Network and System Security, International Conference on Network and System Security. IEEE Computer Society, 2010, pp. 175–182. .
  5. J. Vijayan, "MasterCard SecureCode service impacted in attacks over WikiLeaks," Computer World, 2010, http: //www. computerworld. com/s/article/9200541/MasterCard SecureCode service impacted in attacks over WikiLeaks.
  6. J. Leyden, "Techwatch weathers DDoS extortion attack," The Register, 2009, http://www. theregister. co. uk/2009/01/30/ techwatch ddos/
  7. J. Nazario, "Political DDoS: Estonia and beyond," in USENIX Security '08. USENIX, July 2008,http://streaming. linux- magazin. de/events/usec08/tech/archive/jnazario/. .
  8. http://www. w3. org/TR/2003/REC-soap12-part0-20030624/#L1161. .
  9. http://www. w3. org/TR/2003/WD-wsdl12-20030611/.
  10. http://uddi. org/pubs/uddi-v3. 00-published-20020719. htm.
  11. Francisco Curbera, Matthew Duftler, Rania Khalaf, William Nagy, Nirmal Mukhi, and Sanjiva Weerawarana , Unraveling the Web Services Web, IEEE Internet Computing, March/April(2002)86-93. .
  12. D. Fensel, C. Bussle, Web Services Modeling Framework, Electronic Commerce Research and Applications, 1(2002)113–137
  13. Francisco Curbera, Matthew Duftler, Rania Khalaf, William Nagy, Nirmal Mukhi, and Sanjiva Weerawarana , Unraveling the Web Services Web, IEEE Internet Computing, March/April(2002)86-93
  14. V. Richard Benjamins, Web Services Solve Problems, and Problem-Solving Methods Provide Services, IEEE Intelligent Systems, January/February (2003) 76-77
  15. Christoph Bussler, Alexander Maedche, Dieter Fensel, Web Services: Quo Vadis? IEEE Intelligent Systems, January/February (2003)80-82
  16. Hartwig Gunzer, Sales Engineer, Borland,Introduction to Web Services
  17. Stefan Decker, Sergey Melnik, Frank Van Harmelen, Dieter Fensel, Michel Klein, Jeen Broekstra, Michael Erdmann and Ian Horrocks, The Semantic Web: The Roles of XML and RDF, IEEE Internet Computing , September • October 2000,63-74
  18. Anders Toms Anders. Toms@ida. his. seThreats, Challenges and Emerging Standards in Web Services Security
  19. Hongbing Wang a, b, c,?, Joshua Zhexue Huang c, Yuzhong Qu b, Junyuan Xie a Web services: problems and future directions, (2004) 309–320
  20. Alo . U. Rita and 2Nweke . F. Henry 1, 2Computer Science Department, Ebonyi State University, P. M. B 053 Abakaliki Nigeria, Strategic Techniques for Enhancing Web Services Security in Cloud Computing Model, International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 3, Issue 6, November 2014
  21. http://www. xml. com/pub/a/2001/08/08/xmldsig. html.
Index Terms

Computer Science
Information Sciences

Keywords

Web Services Security XML Encryption WSE SAML Digital Signature WS Security.