ANALYSIS OF END-TO-END SOA SECURITY PROTOCOLS WITH MOBILE DEVICES

被引:1
|
作者
Ahmed, Norman [1 ]
Gamble, Rose [2 ]
Linderman, Mark [3 ]
Bhargava, Bharat [4 ]
机构
[1] Purdue Univ, W Lafayette, IN 47907 USA
[2] Univ Tulsa, Tandy Sch CS, Tulsa, OK 74104 USA
[3] AFRL RIS, Rome, Italy
[4] Purdue Univ, Dept CS, W Lafayette, IN 47907 USA
关键词
cloud computing; service-oriented architecture; security; web services; mobile;
D O I
10.1109/MDM.2013.88
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Service Oriented Architecture (SOA) is an architectural style that provides agility to align technical solutions to a modular business Web Services (WS) that are well decoupled from their consumers. This agility is extended to the Cloud model. To achieve a high level of security and a degree of decoupling, SOA encourages the use of standardized transport schemes such as SOAP/HTTP(s) with WS family of standards specifications (commonly referred to as WS-* (WS-star)) to ease the interoperability complexity and security concerns in enterprise networks, which have medium/high bandwidth and reliable/wired networks. However, these protocol standards are ill suited for mobile devices due to their limited computational capabilities, low bandwidth, and intermittent connectivity. In this paper, we present an analysis of WS-* standards, classifying and discussing their inter-dependencies to provide a basis for determining the limitation of mobile device use in SOA and for establishing an architectural consideration baseline for selecting appropriate security mechanisms.
引用
收藏
页码:166 / 170
页数:5
相关论文
共 50 条
  • [41] Performance Analysis of End-to-End Security Schemes in Healthcare IoT
    Moosavi, Sanaz Rahimi
    Nigussie, Ethiopia
    Levorato, Marco
    Virtanen, Seppo
    Isoaho, Jouni
    9TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2018) / THE 8TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2018) / AFFILIATED WORKSHOPS, 2018, 130 : 432 - 439
  • [42] Security Analysis and Countermeasures of an End-to-End Encryption Scheme of LINE
    Isobe, Takanori
    Minematsu, Kazuhiko
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 313 - 324
  • [43] Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol
    Davies, Gareth T.
    Faller, Sebastian
    Gellert, Kai
    Handirk, Tobias
    Hesse, Julia
    Horvath, Mate
    Jager, Tibor
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT IV, 2023, 14084 : 330 - 361
  • [44] End-To-End Security for Video Distribution
    Boho, Andras
    Van Wallendael, Glenn
    Dooms, Ann
    De Cock, Jan
    Braeckman, Geert
    Schelkens, Peter
    Preneel, Bart
    Van de Walle, Rik
    IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) : 97 - 107
  • [45] An end-to-end security solution for SCTP
    Lindskog, Stefan
    Brunstrom, Anna
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 526 - +
  • [46] A transparent end-to-end security solution
    Thomas, S
    Misra, D
    Eswari, PRL
    Babu, NSC
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 336 - 339
  • [47] End-to-End Security for Personal Telehealth
    Koster, Paul
    Asim, Muhammad
    Petkovic, Milan
    USER CENTRED NETWORKED HEALTH CARE, 2011, 169 : 621 - 625
  • [48] End-to-End Security for Enterprise Mashups
    Rosenberg, Florian
    Khalaf, Rania
    Duftler, Matthew
    Curbera, Francisco
    Austel, Paula
    SERVICE-ORIENTED COMPUTING - ICSOC 2009, PROCEEDINGS, 2009, 5900 : 389 - +
  • [49] End-to-end security for GSM users
    Rekha, AB
    Umadevi, B
    Solanke, Y
    Kolli, SR
    2005 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2005, : 434 - 437
  • [50] End-to-end Internet Speed Analysis of Mobile Networks with MapReduce
    Uzun, Mete
    Abul, Osman
    2016 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC), 2016,