[go: up one dir, main page]

Kumar et al., 2010 - Google Patents

Realization of threats and countermeasure in Semantic Web services

Kumar et al., 2010

View PDF
Document ID
16143177051555563110
Author
Kumar M
Prajapati M
Singh M
De A
Publication year
Publication venue
International Journal of Computer Theory and Engineering

External Links

Snippet

Semantic Web services (SWS) are worn by large number of companies as they rendering products and services to customers and business partners throughout the Internet and corporate extranets. The security necessities for these service providers are of supreme …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Similar Documents

Publication Publication Date Title
Xue et al. Combining data owner-side and cloud-side access control for encrypted cloud storage
US20090254745A1 (en) Efficient security for mashups
KR20060100920A (en) Trusted Third Party Authentication for Web Services
Li et al. Mandatory content access control for privacy protection in information centric networks
Darwish et al. Decentralizing privacy implementation at cloud storage using blockchain-based hybrid algorithm
Chien et al. A MQTT-API-compatible IoT security-enhanced platform
Singh et al. OAuth 2.0: Architectural design augmentation for mitigation of common security vulnerabilities
Contiu et al. Anonymous and confidential file sharing over untrusted clouds
Junghanns et al. Engineering of secure multi-cloud storage
Muftic et al. Business information exchange system with security, privacy, and anonymity
Manzoor Securing device connectivity in the industrial internet of things (IoT)
Lou et al. Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system
Phan Service oriented architecture (soa)-security challenges and mitigation strategies
Otta et al. Cloud identity and access management solution with blockchain
Hirsch et al. Security and Privacy Considerations for the OASIS Security Assertion Markup Language (SAML) V2. 0
Aljahdali et al. Efficient and Secure Access Control for IoT-based Environmental Monitoring
Kumar et al. Realization of threats and countermeasure in Semantic Web services
Kuyoro et al. Security issues in web services
Luntovskyy et al. Security in distributed systems
Al-Shargabi Security engineering for E-government web services: A trust model
Maler et al. Security and privacy considerations for the oasis security assertion markup language (saml) v2. 0
Yagoub et al. A multi-agent system approach based on cryptographic algorithm for securing communications and protecting stored data in the cloud-computing environment
Kohlar et al. Secure bindings of SAML assertions to TLS sessions
Attia et al. E-mail systems in cloud computing environment privacy, trust and security challenges
Reaz et al. A Comprehensive Framework for Building Highly Secure, Network-Connected Devices: Chip to App