Kumar et al., 2010 - Google Patents
Realization of threats and countermeasure in Semantic Web servicesKumar et al., 2010
View PDF- Document ID
- 16143177051555563110
- Author
- Kumar M
- Prajapati M
- Singh M
- De A
- Publication year
- Publication venue
- International Journal of Computer Theory and Engineering
External Links
Snippet
Semantic Web services (SWS) are worn by large number of companies as they rendering products and services to customers and business partners throughout the Internet and corporate extranets. The security necessities for these service providers are of supreme …
- 230000004044 response 0 abstract description 9
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Xue et al. | Combining data owner-side and cloud-side access control for encrypted cloud storage | |
US20090254745A1 (en) | Efficient security for mashups | |
KR20060100920A (en) | Trusted Third Party Authentication for Web Services | |
Li et al. | Mandatory content access control for privacy protection in information centric networks | |
Darwish et al. | Decentralizing privacy implementation at cloud storage using blockchain-based hybrid algorithm | |
Chien et al. | A MQTT-API-compatible IoT security-enhanced platform | |
Singh et al. | OAuth 2.0: Architectural design augmentation for mitigation of common security vulnerabilities | |
Contiu et al. | Anonymous and confidential file sharing over untrusted clouds | |
Junghanns et al. | Engineering of secure multi-cloud storage | |
Muftic et al. | Business information exchange system with security, privacy, and anonymity | |
Manzoor | Securing device connectivity in the industrial internet of things (IoT) | |
Lou et al. | Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system | |
Phan | Service oriented architecture (soa)-security challenges and mitigation strategies | |
Otta et al. | Cloud identity and access management solution with blockchain | |
Hirsch et al. | Security and Privacy Considerations for the OASIS Security Assertion Markup Language (SAML) V2. 0 | |
Aljahdali et al. | Efficient and Secure Access Control for IoT-based Environmental Monitoring | |
Kumar et al. | Realization of threats and countermeasure in Semantic Web services | |
Kuyoro et al. | Security issues in web services | |
Luntovskyy et al. | Security in distributed systems | |
Al-Shargabi | Security engineering for E-government web services: A trust model | |
Maler et al. | Security and privacy considerations for the oasis security assertion markup language (saml) v2. 0 | |
Yagoub et al. | A multi-agent system approach based on cryptographic algorithm for securing communications and protecting stored data in the cloud-computing environment | |
Kohlar et al. | Secure bindings of SAML assertions to TLS sessions | |
Attia et al. | E-mail systems in cloud computing environment privacy, trust and security challenges | |
Reaz et al. | A Comprehensive Framework for Building Highly Secure, Network-Connected Devices: Chip to App |