期刊文献+

企业信息系统中的Web Service安全 被引量:3

Web Service Security in Enterprise Information Systems
原文传递
导出
摘要 企业信息系统在发展过程中逐渐具有跨域、跨互联网等性质,其结构日益复杂,同时企业数据的机密性又对信息系统的业务运行过程提出了更高的安全需求。目前对于采用SOA进行架构的信息系统尚没有正式的国际安全标准和规范,通过对企业环境下的Web Service安全技术,如传输层安全和SOAP安全、数字签名和断言等进行研究,以J2EE架构下的企业环境为例,提供了一种通过结合企业安全服务和综合应用层、传输层安全技术来保障企业信息系统整体安全性、可靠性的可行思路。 The enterprise information system nowadays is largely domain-cross and Internet-cross,and is constructed with unprecedented complexity.Meanwhile the confidentiality of enterprise data requires the business process to be more secure than before.However,there exists no official standard and specification for SOA-architected information systems.Based on investigation of security technologies for Web services such as transport layer security,SOAP security,digital signature and assertions under enterprise environments,and with J2EE-architected enterprise environment as an example,a method in combining enterprise security services together with application/transport level security measures,for assuring enterprise information security and the method is proved applicable.
作者 许玲
出处 《通信技术》 2011年第5期48-51,共4页 Communications Technology
关键词 企业信息系统 WEB SERVICE 信息安全 SOAP XML enterprise information system Web service information security SOAP XML
  • 相关文献

参考文献8

  • 1GINIGE A. Web Engineering: Managing the Complexity of Web Systems Development[C].Italy: ACM Press, 2002:120-124.
  • 2CHINNICI R. Web Service Description Language(WSDL) Version 2. 0[EB/OL]. (2001-12-19) [2010-11-15]. http://www, w3. org/ 2002/ws/desc.
  • 3Universial Description. Discovery and Integration(UDDI) [EB/OL]. (2001-06-23) [2010-11-15].http://www. oasis-open. org/committees/uddi.
  • 4乔波.Web Service安全技术研究[J].信息安全与通信保密,2007,29(8):139-141. 被引量:6
  • 5SATHIASEELAN J G R, RABARA S A, MARTIN J R. Multi Level Secure Framework for Composite Web Services[C]. USA: ACM, 2009:580-585.
  • 6WIKIPEDIA. Simple Object Access Protocol(SOAP) Version 1.2[EB/OL]. (2002-04-17) [2010-11-15].http://www. w3. org/TR/2003/REC-soap12-20030624.
  • 7MALER F. OASIS Security Assertion Markup Language(SAML) [EB/OL]. (2001-09-03) [2010-11-15].http://www. oasis-open org/committees/security.
  • 8商建伟,李大兴.一个安全的企业域上的PKI建设方案[J].通信技术,2002,35(1X):74-76. 被引量:4

二级参考文献10

  • 1[1]Prabhat K.Singh,Arun Lakhotia.Analysis and Detection of Computer Viruses and Worms:An Annotated Bibliography,ACM SIGNPLAN Notices,2002,37(2):29~35.
  • 2[2]Cohen F.Computer Viruses-Theory and Experiments[C],Computers and Security,1984,6:143~58.
  • 3[3]Cohen F.Computational Aspects of Computer Viruses[J].Computers and Security,1989,8(4):325~344.
  • 4[4]David M.Chess,Steve R.White.An Undetectable Computer Virus[C].In Virus Bulletin Conference,2000.
  • 5[5]Fred C.A Case for Benevolent Viruses[C].ASP Press,1991.
  • 6[6]Vesselin B.Are 'Good' Computer Viruses Still a Bad Idea?[C].Proc.EICAR' 94 Conf,1994:25~47.
  • 7[7]Adleman L M.An abstract theory of computer viruses[C].Advances in cryptology-CRYPTO' 88 Proceedings,New York:Springer-Verlag,1988:354~374.
  • 8[8]Diomidis Spinellis.Reliable identification of bounded-length viruses is NP-complete[J].IEEE transactions on information theory,2003,49(1):280~284.
  • 9[9]Harold Thimbleby,Stuart Anderson,Paul Cairns.A framework for modeling trojans and computer virus infection[J].Computer Journal,1999,41 (7):444~458.
  • 10[10]Erkki Makinen.Comment on' A framework for modeling tro-jans and computer virus infection'[J].British Computer Sociaty,2001,44(4):321~323.

共引文献8

同被引文献25

引证文献3

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部