ANALYSIS OF END-TO-END SOA SECURITY PROTOCOLS WITH MOBILE DEVICES

被引:1
|
作者
Ahmed, Norman [1 ]
Gamble, Rose [2 ]
Linderman, Mark [3 ]
Bhargava, Bharat [4 ]
机构
[1] Purdue Univ, W Lafayette, IN 47907 USA
[2] Univ Tulsa, Tandy Sch CS, Tulsa, OK 74104 USA
[3] AFRL RIS, Rome, Italy
[4] Purdue Univ, Dept CS, W Lafayette, IN 47907 USA
关键词
cloud computing; service-oriented architecture; security; web services; mobile;
D O I
10.1109/MDM.2013.88
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Service Oriented Architecture (SOA) is an architectural style that provides agility to align technical solutions to a modular business Web Services (WS) that are well decoupled from their consumers. This agility is extended to the Cloud model. To achieve a high level of security and a degree of decoupling, SOA encourages the use of standardized transport schemes such as SOAP/HTTP(s) with WS family of standards specifications (commonly referred to as WS-* (WS-star)) to ease the interoperability complexity and security concerns in enterprise networks, which have medium/high bandwidth and reliable/wired networks. However, these protocol standards are ill suited for mobile devices due to their limited computational capabilities, low bandwidth, and intermittent connectivity. In this paper, we present an analysis of WS-* standards, classifying and discussing their inter-dependencies to provide a basis for determining the limitation of mobile device use in SOA and for establishing an architectural consideration baseline for selecting appropriate security mechanisms.
引用
收藏
页码:166 / 170
页数:5
相关论文
共 50 条
  • [31] ELICITING THE END-TO-END BEHAVIOR OF SOA APPLICATIONS IN CLOUDS
    Zoraja, Ivan
    Trlin, Goran
    Sunderam, Vaidy
    COMPUTING AND INFORMATICS, 2016, 35 (02) : 259 - 281
  • [32] End-to-End Authentication Protocols for Personal/Portable Devices over Cognitive Radio Networks
    Kim, Hyunsung
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 123 - 138
  • [33] Counting protocols for reliable end-to-end transmission
    Ladner, Richard E.
    LaMarca, Anthony
    Tempero, Ewan
    1998, Academic Press Inc., Orlando, FL, United States (56)
  • [34] Counting protocols for reliable end-to-end transmission
    Ladner, RE
    LaMarca, A
    Tempero, E
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1998, 56 (01) : 96 - 111
  • [35] Modeling the Value of End-to-End Multipath Protocols
    Suomi, Henna
    Kilkki, Kalevi
    Hammainen, Heikki
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2012, 18 (14) : 2071 - 2092
  • [36] MODELING AND VERIFICATION OF END-TO-END TRANSPORT PROTOCOLS
    DANTHINE, A
    BREMER, J
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1978, 2 (4-5): : 381 - 395
  • [37] AN END-TO-END TESTBED FOR SCALABLE VIDEO STREAMING TO MOBILE DEVICES OVER HTTP
    Li, Yu-Sian
    Chen, Chien-Chang
    Lin, Ting-An
    Hsu, Cheng-Hsin
    Wang, Yichuan
    Liu, Xin
    2013 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME 2013), 2013,
  • [38] An End-to-End Deep Learning Approach for Video Captioning Through Mobile Devices
    Pezzuto Damaceno, Rafael J.
    Cesar, Roberto M., Jr.
    PROGRESS IN PATTERN RECOGNITION, IMAGE ANALYSIS, COMPUTER VISION, AND APPLICATIONS, CIARP 2023, PT I, 2024, 14469 : 715 - 729
  • [39] Exploring the requirements for multimodal interaction for mobile devices in an end-to-end journey context
    Krehl, Claudia
    Sharples, Sarah
    WORK-A JOURNAL OF PREVENTION ASSESSMENT & REHABILITATION, 2012, 41 : 1132 - 1139
  • [40] End-to-End Encrypted Messaging Protocols: An Overview
    Ermoshina, Ksenia
    Musiani, Francesca
    Halpin, Harry
    INTERNET SCIENCE, (INSCI 2016), 2016, 9934 : 244 - 254