CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Securing Web Services by Iris Recognition System

by Bava Elizabeth Mathew
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 13 - Number 7
Year of Publication: 2011
Authors: Bava Elizabeth Mathew
10.5120/1793-2483

Bava Elizabeth Mathew . Securing Web Services by Iris Recognition System. International Journal of Computer Applications. 13, 7 ( January 2011), 23-27. DOI=10.5120/1793-2483

@article{ 10.5120/1793-2483,
author = { Bava Elizabeth Mathew },
title = { Securing Web Services by Iris Recognition System },
journal = { International Journal of Computer Applications },
issue_date = { January 2011 },
volume = { 13 },
number = { 7 },
month = { January },
year = { 2011 },
issn = { 0975-8887 },
pages = { 23-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume13/number7/1793-2483/ },
doi = { 10.5120/1793-2483 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:02:05.469763+05:30
%A Bava Elizabeth Mathew
%T Securing Web Services by Iris Recognition System
%J International Journal of Computer Applications
%@ 0975-8887
%V 13
%N 7
%P 23-27
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A web service is defined as a software system designed to support interoperable machine-to-machine interaction over a network. It is an application programming interface. It can be published, located and invoked across the internet. As web service is connected to the internet, it is subjected to unauthorized intrusion. In order to ensure the availability, integrity and confidentiality of the web services, security is necessary. Access controls such as biometrics should be employed for the strong authentication. It is the most robust method to verify and identify an individual, once that person is properly enrolled. The bringing together of biometric and web services can strengthen both the technologies. Iris recognition system is a biometric method that has always held the promise of highly accurate identity verification, without compromising the simplicity of the web services. This paper describes how iris biometrics helps to secure web services.

References
  1. A. Tsalgatidou, T. Pilioura, “An Overview of Standards and Related Technology in Web Services”, International Journal of Distributed and Parallel Databases, Special Issue on E-Services, 12(2) Sep 2002, pp. 135-162.
  2. Luann Rragami, Nicholas H. Edwards, “Securing web services with biometrics”, Biometric Technology Today, 11 (5) (2003), pp. 6-8
  3. David C.Chou, Kirill Yurov, “Security development in web services environment “, Computer standards and interfaces , 27 (3) (2005), pp. 233-240.
  4. Ramakanta Mohanty, V. Ravi b, M.R. Patra , “Web-services classification using intelligent techniques”, Expert Systems with Applications ,37 (2010), pp. 5484–5490.
  5. Hongbing Wang, Joshua Zhexue Huang, Yuzhong Qu and Junyuan Xie, “Web services: problems and future directions”, Journal of web semantics 1 (2004), pp. 309-320.
  6. Christian Geuer-Pollmann, Joris Claessens, “Web services and web service security standards”, Information Security Technical Report 10 (2005), pp 15-24.
  7. Kokash,” Web service discovery with implicit QoS filtering”, In Proceedings of the IBM PhD student symposium, in conjunction with ICSOC’05, pp. 61–66, Netherlands.
  8. Weaver et al., “Federated, secure trust networks for distributed healthcare IT services”, Industrial Informatics, 2004, pp. 162 – 169.
  9. Stuart King, “Threat and solutions to web service security”, Network Security, 9(2003), pp. 8-11
  10. Rasika Dayarathna, “The principle of safety safeguards: unauthorized activities”, Computer Law and Security Review, 25 (2009) , pp. 165-172.
  11. Mohamed G. Gouda, Alex X. Liu, Lok M. Leung, Mohamed A. Alam,” SPP: An anti phishing single password protocol”, Computer Networks, 51 (2007), pp. 3715–3726.
  12. J. Wayman, A. Jain, D. Maltoni, D. Maio, Biometric Systems, Technology, Design and Performance Evaluation, 2005
  13. Marek Rejman-Green, “Secure authentication using biometric methods”, Information Security Technical Report, 7 (3) (2002), pp. 30-40
  14. Y. Zhu, T. Tan, and Y. Wang, “Biometric personal identification system based on iris pattern” ChinesePatent Application, No. 9911025.6, 1999
  15. Arun Ross, “Iris recognition: the path forward”, IEEE Computer Society, 2010.
  16. Makram Nabti, Ahmed Bouridane, “An effective and fast iris recognition system based on a combined multiscale feature extraction technique”, Pattern Recognition, 41 (2008), pp. 868 – 879.
  17. Laine and J. Fan, “Texture classification by wavelet packet signatures”, IEEE Trans. Pattern Anal. Machine Intell., vol.15, 1993,pp.1186-1191.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Iris biometrics Security Unauthorized access Web services