期刊文献+

基于Axis2的web服务安全框架设计与实现 被引量:6

Design and implementation of web service security framework based on Axis2
下载PDF
导出
摘要 web服务的广泛应用和网络技术多元化的发展迫切需求一个既能实现web服务安全,又能兼容各种客户端的安全框架。在Axis2的基础上,设计并实现了一个完整的、符合WS-Security规范的web服务框架。框架以文件配置、消息加密和程序控制实现web服务安全,采用SOAP通信协议解决了与各种客户端通信的问题。测试结果表明,此框架可以实现数字签名、消息加密和基于角色的访问控制,能够接收各种基于SOAP协议的客户端请求,具有很好的安全性和兼容性,为企业的web服务安全提供了一个有效的解决方案。 With the extensive application of web services and the rapid development of network technology,a web service security framework,which is compatible to various clients,is in need.We use the file configuration,encryption algorithm and program control module,implement a web service security framework which satisfies WS-Security specification based on Axis2.The service communicates with various clients under SOAP protocol.The experimental results indicate that the framework implements digital signature,message encryption,roles based access control and could communicate with various web services clients that are based on SOAP network communication protocol,has a good security and compatibility.The security framework is an efficient solution for web service of enterprise.
出处 《计算机工程与设计》 CSCD 北大核心 2012年第5期1729-1733,1821,共6页 Computer Engineering and Design
基金 国家自然科学基金项目(70971111)
关键词 WEB服务安全 SOAP通信协议 数字签名 消息加密 访问控制 web service security SOAP network communication protocol digital signature message encryption access control
  • 相关文献

参考文献2

二级参考文献73

  • 1IBM.Web Services Federation Language (WS-Federation)[EB/OL].http://specs.xmlsoap.org/ws/2003/07/secext/WS-Fede-ration.pdf,2003.
  • 2Liberty ID-WSF Overview v1.1[EB/OL].http://www.projec-tliberty.org/liberty/ content/download/1307/8286/file/liberty-idwsf-overview-v1.1.pdf.
  • 3Vecchio D,Basney J,Nagaratnam N.CredEx:User-Centric Credential Management for Grid and Web Services[C] ∥Procee-dings of the ICWS'05.2005.
  • 4David F,Ravi S,Serban G,et al.Proposed NIST Standard for Role-based Access Control[J].ACM Transactions on Information and System Security,2001,4(3):224-274.
  • 5Eric Y,Jin T.Attributed based access control for Web services[C] ∥Proceedings of the ICWS'05.2005.
  • 6Shen Hai-bo,Hong Fan.An Attribute-based Access Control Modelfor Web Services[C] ∥Proceedings of the PDCAT'06.2006.
  • 7Rafae B,James B D J,Elisa B.XML-based specification for Web Services Document Security[C] ∥Proceedings of the ICWS'04.2004.
  • 8Bhatti R,Sanz D,Bertino E.A Policy-based Authorization Fra-mework for Web Services:Integrating XGTRBAC and WS-Policy[C] ∥Proceedings of the ICWS'07.2007.
  • 9Roosdiana W,Zahir T.A Role based Access Control for Web Services[C] ∥Proceedings of the SCC'04.2004.
  • 10Srivatsa M,Iyengar A,Mikalsen T,et al.An Access Control System for Web Service Compositions[C] ∥Proceedings of the ICWS'07.2007.

共引文献17

同被引文献42

  • 1吴永英,吕继云,班鹏新.基于JMS和XML的数据集成研究[J].计算机应用研究,2004,21(7):43-45. 被引量:24
  • 2戚正伟,尤晋元.基于细胞膜演算的Web服务事务处理形式化描述与验证[J].计算机学报,2006,29(7):1137-1144. 被引量:8
  • 3汪勇,王备战.基于Web Service的数据交换平台解决方案[J].微处理机,2007,28(4):120-122. 被引量:19
  • 4Neila B L, Takashi K, Haruo Y. WS-SAGAS: Transaction Model for Reliable Web-services-composition Specification and Execution[J]. DBSJ Letters, 2003, 12(2): 17-20.
  • 5Neila B L, Takashi K, Haruo Y. Reliability and Performance Estimation for Enriched WS-SAGAS[C]//Proc. of Intern- ational Workshop on Challenges in Web Information Retrieval and Integration. Tokyo, Japan: [s. n.], 2005: 54-63.
  • 6Neila B L, Takashi K, Haruo Y. A Simulation System of THROWS Architecture with WS-SAGAS Transaction Model[J]. DBSJ Letters, 2004, 3(1): 89-92.
  • 7Charles Chen, Midori Tanino, Bruce Taylor. Flight informa- tion exchange via net-centric services [C] //Integrated Com- munications Navigation and Surveillance Conference , 2013.- C1- 1-C1-8.
  • 8Prabhu V, Simons M. NextGen and SWIM evolution in the mid-term [C] //Integrated Communications, Navigation and Surveillance Conference, 2009 : 1-11.
  • 9Meserole JS, Moore JW. What is system wide information management (SWIM)? [J]. Aerospace and Electronic Systems Magazine, 2007, V22 (5): 13-19.
  • 10Dario Di Crescenzo, Antonio Strano, Georg Trausmuth. Sys tern wide information management: The SWIM-SUIT prototype [C] //Integrated Communications Navigation and Surveillance Conference, 2010: C2-1-C2-13.

引证文献6

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部