期刊文献+

基于SPKI的XML Web服务安全性分析 被引量:4

Security analysis of XML web service based on SPKI
下载PDF
导出
摘要 介绍了Web服务的安全性问题,分析了当前Web服务的安全模型和框架。特别对SOAP层的消息安全进行了重点介绍,包括XML加密和XML数字签名,阐述了SOAP安全扩展。介绍了WS-Security规范,在此基础上提议采用SPKI证书作为授权和身份验证的安全性令牌,具体阐述了SPKI安全令牌的结构和在Web服务中的使用优势。最后,形成了一个集XML安全、SOAP安全、UDDI安全和SPKI证书安全为一体的Web服务安全结构。 Security problems of web service are introduced, and current security model and frame of web service are analyzed. Especially, message security at SOAP layer is described importantly including XML encryption and XML digital signature, and security expansion on SOAP is also expressed. WS-security criterion is presented, and on this basis, SPKI certificate is advised to use as a security token for the authority and identity authentication, Then the structure of SPKI security token and the predominance of being used in the web service are put forward. At last, a security structure is formed, which is composed of XML security, SOAP security, UDDI security and SPKI certificate security.
作者 王茜 刘启滨
出处 《计算机工程与设计》 CSCD 北大核心 2006年第9期1637-1639,1651,共4页 Computer Engineering and Design
关键词 XMLWeb服务 安全 SOAP SPKI 授权 XML web service security SOAP SPKI authority
  • 相关文献

参考文献7

  • 1羽田知史.SOAP安全性扩展:数字签名[EB/OL].http://safe.jz173.com/20040809/20040809163302-2.html.
  • 2Dwaine Clarke,Jean-Emile Elien.Certificate chain discovery in SPKI/SDSI[J].Journal of Computer Security,2001,9(4):285-322.
  • 3IBM 和微软公司.Web服务安全性(WS-Security)[EB/OL].http://www-128.ibm.com/developerworks/cn/webservices/wssecure/.
  • 4IBM和微软公司.Web服务提议的体系架构和指南[EB/OL].http://vision.pku.edu.cn/yan2/zyzl/zyzl-sls/HTML/Web%20Security.htm.
  • 5Maryann Hondo,等.Web服务安全性:发展协议栈[EB/OL].http://indus try.ccidnet.com/pub/article/c1139-a45530-p1.html.
  • 6James Snell.保护 Web 服务[EB/OL].http://home.donews.com/donews/article/ 4/41956.html.
  • 7蒋兴浩,万晨妍,陈抗生.利用SPKI委托证书实现分布式访问控制[J].电讯技术,2002,42(1):35-38. 被引量:2

二级参考文献3

  • 1[1]Carl Ellison, et al. SPKI Certificate Theory[C], RFC2693, September 1999.
  • 2[2]Thomas Aura, On the Structure of Delegation Networks[C], In proc. 11th IEEE Computer Security Foundations Workshop, June 1998,pages 14~26.
  • 3[3]Thomas Aura, Fast Access Control Decisions from Delegation Certificate Databases[C], In proc. 3rd Australasian Conference on Information Security and Privacy ACISP'98, volume 1438 of LNCS, July 1998,pages 284~295.

共引文献1

同被引文献18

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部