Web services and grid security vulnerabilities and threats analysis and model.

被引:0
|
作者
Demchenko, Y [1 ]
Gommans, L [1 ]
de Laat, C [1 ]
Oudenaarde, B [1 ]
机构
[1] Univ Amsterdam, Adv Internet Res Grp, NL-1098 SJ Amsterdam, Netherlands
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The paper provides an overview of available Web Services security vulnerability models and proposes a classification of the potential Grid and Web Services attacks and vulnerabilities. This is further used to introduce a security model for interacting Grid and Web Services that illustrates how basic security services should interact to provide an attack-resilient multilayer protection in a typical service-oriented architecture. The analysis and the model can be used as a basis for developing countermeasures against known vulnerabilities and security services design recommendations. The paper refers to the ongoing work on middleware and operational security in the framework of the European Grid infrastructure deployment project EGEE and related coordination groups.
引用
收藏
页码:262 / 267
页数:6
相关论文
共 50 条
  • [31] An empirical study of security threats and countermeasures in Web Services-based Services Oriented Architectures
    Yunus, M
    Mallal, R
    WEB INFORMATION SYSTEMS ENGINEERING - WISE 2005, 2005, 3806 : 653 - 659
  • [32] Modem Network Vulnerabilities and Security Testing - Actual Threats
    Polivka, Michal
    Oujersky, Vaclav
    Skorpil, Vladislav
    2015 38TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2015, : 33 - 36
  • [33] Towards a model for quality of Web and grid services
    Andreozzi, S
    Ciancarini, P
    Montesi, D
    Moretti, R
    THIRTEENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2004, : 271 - 276
  • [34] The EU strategy for gas security: Threats, vulnerabilities and processes
    Landry, Paulina
    ENERGY POLICY, 2020, 144 (144)
  • [35] Security Concerns in Smart Grids: Threats, Vulnerabilities and Countermeasures
    Khelifa, Benahmed
    Abla, Smahi
    PROCEEDINGS OF 2015 3RD IEEE INTERNATIONAL RENEWABLE AND SUSTAINABLE ENERGY CONFERENCE (IRSEC'15), 2015, : 772 - 777
  • [36] A review Report on WiMAX Vulnerabilities, Security Threats and their Solutions
    Kumar, Chandan
    Arya, Y. D. S.
    Agarwal, Gaurav
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1963 - 1967
  • [37] Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study
    Humayun, Mamoona
    Niazi, Mahmood
    Jhanjhi, N. Z.
    Alshayeb, Mohammad
    Mahmood, Sajjad
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (04) : 3171 - 3189
  • [38] Wireless LAN Security Threats & Vulnerabilities: A Literature Review
    Waliullah, Md.
    Gan, Diane
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (01) : 176 - 183
  • [39] Embedded Systems Security: Threats, Vulnerabilities, and Attack Taxonomy
    Papp, Dorottya
    Ma, Zhendong
    Buttyan, Levente
    2015 THIRTEENTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2015, : 145 - 152
  • [40] On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
    Kumar, Rakesh
    Goyal, Rinkaj
    COMPUTER SCIENCE REVIEW, 2019, 33 : 1 - 48