期刊文献+

Web服务运行管理平台安全结构的研究与实现 被引量:5

Research and implementation of security architecture for Web service runtime
下载PDF
导出
摘要 使用安全管理域等基本概念分析了Web服务运行管理平台WSR(WebServiceRuntime)的应用模式和安全需求 .提出了基于链式处理结构的WSR安全结构 .该结构支持多种新型安全技术和规范 ,灵活、可配置 。 The application modes and security requirements of Web service runtime (WSR) were analyzed using several fundamental concepts, such as security administration domain. A security architecture based on processing chain structure was presented. The security architecture supports the latest security technologies and related specifications. It's flexible and could be configured, and provides fairly comprehensive protection for WSR and those Web services managed by it.
出处 《北京航空航天大学学报》 EI CAS CSCD 北大核心 2003年第10期885-888,共4页 Journal of Beijing University of Aeronautics and Astronautics
基金 国家 8 63基金资助项目 ( 2 0 0 1AA113 0 3 0 )
关键词 网络 安全 网络服务 安全结构 安全策略 Computer applications Computer architecture Computer networks Information services World Wide Web
  • 相关文献

参考文献9

  • 1舒剑. Web Service运行管理平台的研究与实现[D]. 北京:北京航空航天大学计算机学院, 2003Shu Jian. Research and implemetation of Web service run time platform[D]. Beijing:School of Computer Science and Technology, Beijing University of Aeronautics and Astrohautics,2003(in Chinese)
  • 2Martin G, MarC H, Noah M, et al. SOAP version 1.2 part 1: message framework (W3C candidate recommendation) [EB/OL]. http://www.w3.org/TR/2002/CR-soap12-part1-20021219/, 2002-12-19/2002-12-23
  • 3OASIS. Assertions and protocol for the OASIS security assertions markup language[EB/OL]. http://www.oasis-open.org/committees/security/docs/, 2002-11-05/2002-12-23
  • 4Allen B, Barbara F, Satoshi H, et al. SOAP security extensions: digital signature[EB/OL]. http://www.w3.org/TR/2001/NOTE-SOAP-dsig-20010206/, 2001-02-06/2002-12-23
  • 5IBM & Microsoft. Security in a Web service world: a proposed architecture and roadmap [EB/OL]. http://www-106.ibm.com/developer works/webservices/library/ws-secmap/, 2002-04-07/2002-12-23
  • 6Foster I, Kesselman C, Tsudik G, et al. A security architecture for computational grids[A]. Proceedings of the 5th ACM Conference on Computer and Communications Security[C]. CA:San Francisco,1998.83~92
  • 7Bob A, Giovanni D, Satoshi H, et al. Web services security (WS-security) [EB/OL]. http://www-106.ibm.com/developerworks/Web services/library/ws-secure/, 2002-04-05/2002-12-23
  • 8Sandhu R, Conyne E J, Lfeinstein H, et al. Role based access control models[J]. IEEE Computer, 1996,29(2):38~47
  • 9Warwick F, Phillip H, Barbara F,et al. XML key management specification [EB/OL].http:// www.w3.org/TR/2001/NOTE-xkms-20010330/, 2001-03-30/2002-12-23

同被引文献26

  • 1孙仁科,肖永全,张玉东.Web服务的安全机制和安全模型[J].计算机应用与软件,2005,22(6):112-114. 被引量:9
  • 2王金云.处理信息安全突发事件的多Agent分布式协同管理机制[J].微计算机信息,2005,21(12X):32-35. 被引量:5
  • 3Etic Puffer,Hugh Taylor.Solutions to SOA Security [EB/ OL]. http ://www. developer. com/java/ent/article.php/360 7471.
  • 4Rich Seeley,News Writer.New WS-I pmtile meshes SOA security and interoperability [EB/OL]. http://searchsoa.techtarget.com/originalContent/0,289142,sid26_gci12502 42,00.html.
  • 5Anthony Nadalin.用于实现Web服务的SOA编程模型:第7部分:保护面向服务的应用程序[EB/OL].http://www.ibm.com/developerworks/cn/webservices/ws-soa-progmodel7/N100AE.
  • 6[2]Foster I.What is the grid? A three points checklist.Grid Today,2002,1(6).http://www.gridtoday.com/02/0722/100136.html
  • 7[7]Mike A,Madhu T.Oracle 10G Grid & Real Application Clusters.USA:Rampant Tech.Press,2004
  • 8[8]Oracle Real Application Clusters 10G-2006-01.http://www.oracle.com/lang/cn/technologies/grid/index.html
  • 9[9]Murali V.Oracle Real Application Clusters.USA:Digital Press,2003
  • 10[10]Robert F.Oracle Database 10G New Features.USA:Osborne Oracle Press Series,2004

引证文献5

二级引证文献95

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部