ANALYSIS OF END-TO-END SOA SECURITY PROTOCOLS WITH MOBILE DEVICES

被引:1
|
作者
Ahmed, Norman [1 ]
Gamble, Rose [2 ]
Linderman, Mark [3 ]
Bhargava, Bharat [4 ]
机构
[1] Purdue Univ, W Lafayette, IN 47907 USA
[2] Univ Tulsa, Tandy Sch CS, Tulsa, OK 74104 USA
[3] AFRL RIS, Rome, Italy
[4] Purdue Univ, Dept CS, W Lafayette, IN 47907 USA
关键词
cloud computing; service-oriented architecture; security; web services; mobile;
D O I
10.1109/MDM.2013.88
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Service Oriented Architecture (SOA) is an architectural style that provides agility to align technical solutions to a modular business Web Services (WS) that are well decoupled from their consumers. This agility is extended to the Cloud model. To achieve a high level of security and a degree of decoupling, SOA encourages the use of standardized transport schemes such as SOAP/HTTP(s) with WS family of standards specifications (commonly referred to as WS-* (WS-star)) to ease the interoperability complexity and security concerns in enterprise networks, which have medium/high bandwidth and reliable/wired networks. However, these protocol standards are ill suited for mobile devices due to their limited computational capabilities, low bandwidth, and intermittent connectivity. In this paper, we present an analysis of WS-* standards, classifying and discussing their inter-dependencies to provide a basis for determining the limitation of mobile device use in SOA and for establishing an architectural consideration baseline for selecting appropriate security mechanisms.
引用
收藏
页码:166 / 170
页数:5
相关论文
共 50 条
  • [21] End-to-End Security for the IoT
    Dooley, James
    INTELLIGENT ENVIRONMENTS 2016, 2016, 21 : 606 - 606
  • [22] END-TO-END SECURITY PROTECTION
    Nazaryan, Levon
    Panaousis, Emmanouil A.
    Politis, Christos
    IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2010, 5 (01): : 85 - 90
  • [23] PERSONALIZATION OF END-TO-END SPEECH RECOGNITION ON MOBILE DEVICES FOR NAMED ENTITIES
    Sim, Khe Chai
    Beaufays, Francoise
    Guliani, Arnaud Benard Dhruv
    Kabel, Andreas
    Khare, Nikhil
    Lucassen, Tamar
    Zadrazil, Petr
    Zhang, Harry
    Johnson, Leif
    Motta, Giovanni
    Zhou, Lillian
    2019 IEEE AUTOMATIC SPEECH RECOGNITION AND UNDERSTANDING WORKSHOP (ASRU 2019), 2019, : 23 - 30
  • [24] Security Analysis of End-to-End Encryption for Zoom Meetings
    Isobe, Takanori
    Ito, Ryoma
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 234 - 253
  • [25] Security Analysis of End-to-End Encryption for Zoom Meetings
    Isobe, Takanori
    Ito, Ryoma
    IEEE ACCESS, 2021, 9 : 90677 - 90689
  • [26] The Many Faces of End-to-End Encryption and Their Security Analysis
    Nabeel, Mohamed
    2017 IEEE 1ST INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE), 2017, : 252 - 259
  • [27] Transformer Model Compression for End-to-End Speech Recognition on Mobile Devices
    Ben Letaifa, Leila
    Rouas, Jean-Luc
    2022 30TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO 2022), 2022, : 439 - 443
  • [28] SplitSR: An End-to-End Approach to Super-Resolution on Mobile Devices
    Liu, Xin
    Li, Yuang
    Fromm, Josh
    Wang, Yuntao
    Jiang, Ziheng
    Mariakakis, Alex
    Patel, Shwetak
    PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT, 2021, 5 (01):
  • [29] End-to-end security validation of IoT systems based on digital twins of end-devices
    Maillet-Contoz, Laurent
    Michel, Emmanuel
    Nava, Mario Diaz
    Brun, Paul-Emmanuel
    Lepretre, Kevin
    Massot, Guillemette
    2020 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS), 2020,
  • [30] Cryptanalysis of the end-to-end security protocol for mobile communications with end-user identification/authentication
    Zhou, YB
    Zhang, ZF
    Feng, DG
    IEEE COMMUNICATIONS LETTERS, 2005, 9 (04) : 372 - 374