SecureE-businessTransactionsBySecuringWebServices (1).pdf

SecureE-businessTransactionsBySecuringWebServices (1).pdf -...

This preview shows page 1 - 3 out of 7 pages.

See discussions, stats, and author profiles for this publication at: Secure E-business Transactions by Securing Web Services Conference Paper · October 2012 DOI: 10.1109/ICMeCG.2012.11 CITATIONS 3 READS 90 2 authors: Some of the authors of this publication are also working on these related projects: E-learning Architecture View project EVALUATION OF VOIP SECURITY View project Ahmad Tasnim Siddiqui Taif University 28 PUBLICATIONS 35 CITATIONS SEE PROFILE A.K. Singh Jazan University 12 PUBLICATIONS 63 CITATIONS SEE PROFILE All content following this page was uploaded by Ahmad Tasnim Siddiqui on 29 May 2014. The user has requested enhancement of the downloaded file.
Image of page 1

Subscribe to view the full document.

Secure E-business Transactions By Securing Web Services Ahmad Tasnim Siddiqui College of Computers & IT Taif University Taif, Saudi Arabia [email protected] Arun Kumar Singh Dept. of Computer Science Jazan University Jazan, Saudi Arabia [email protected] Abstract— Due to the popularity of internet and the growth of e- business, the world became very small. Everyday people are using internet as the medium of transaction of millions of dollars from one account to another. The web services are playing very crucial role in online transactions. That’s why we have to think about the security of our entire transactions as well as web services. Web service transaction should be of major concern. Many technologies available which are providing web service facilities, for example java, .net etc. There are various options available to make web services secure. We can choose any options from protocols based, platform based or message based security. There are securities which can be IIS based, based and SSL etc. Various threats to web services and e-business are also present. Threats like unauthorized access, alteration, disclosure of very important data, message reply etc. Anyone can hack the WSDL information and can get into downloadable files. While designing and developing the web services we have to think about code access security. In this .NET technology is being used for most of the examples.In this paper, the possibility of reducing the business cost through e-business is being explored. Keywords-web service;web service security; threat to web services; web service security requirements; web service and e- business security I. I NTRODUCTION As Before entering into the inside story we should know about the web services. According to the World Wide Web Consortium (W3C), “Web Service is a software system designed to support interoperable machine-to-machine interaction over a network”1. Web service provides distributed computing for creating, publishing, discovering and consuming the services over internet. Simon defines web services as, Web services = XML + SOAP + WSDL + UDDI. “Web service is a software system which is identified by a URI and completely binded and described by XML”2. A web service is used to invoke the remote methods by using SOAP (Simple Object Access Protocol). SOAP uses XML standards (protocols and
Image of page 2
Image of page 3
  • Summer '17
  • mani
  • World Wide Web, Web server

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern