Share This Article:

Solutions for 3 Security Problems and its Application in SOA-FCA Service Components Based SDO

Abstract Full-Text HTML Download Download as PDF (Size:365KB) PP. 811-815
DOI: 10.4236/ijcns.2010.310109    3,708 Downloads   6,996 Views   Citations

ABSTRACT

Service-Oriented Architecture (SOA), which is an open architecture, provides developers with more freedom. However, its security problem goes from bad to worse. By taking an insurance business in Formal Concept Analysis (SOA-FCA) Service Components based Service Data Object (SDO) data model transfer with proxy as an example, the security issue of SDO data model was analyzed in this paper and this paper proposed a mechanism to make sure that the confidentiality, integrity, and non-repudiation of SDO data model are preserved by applying encryption/decryption, digest, digital signature and so on. Finally, this mechanism was developed and its performance was evaluated in SOA-FCA Service Components.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

N. Wang, Z. Fang, K. Yan, Y. Tang and X. An, "Solutions for 3 Security Problems and its Application in SOA-FCA Service Components Based SDO," International Journal of Communications, Network and System Sciences, Vol. 3 No. 10, 2010, pp. 811-815. doi: 10.4236/ijcns.2010.310109.

References

[1] T. Erl, “Service-Oriented Architecture (SOA): Concepts, Technology, and Design,” Prentice Hall PTR, Upper Saddle River, New Jersey, 2005.
[2] B. Portier and F. Budinsky, “Introduction to SDO,” IBM developerWorks, 2004.
[3] M. John, “Security Models: Encyclopedia of Software Engineering,” Wiley Press, 1994.
[4] M. Benedikt, C. Cheeyonyong, W. F. Fan, et al, “Capturing Both Types and Constraints in Data Integration,” Proceedings of the ACM SIGMOD International Conference on Management of Data, San Diego, California, USA, 2003, pp. 277-288.
[5] D. Chaum and H. Van Antwerpen, “Undeniable Signatures,” Advances in Cryptology-CRYPTO’89, LNCS 435. Berlin: Springer-Verlag, 1989.
[6] S. W. Galbraith, “Invisibility and Anonymity of Undeniable and Confirmer Signatures,” Topics in Cryptology- CT-RSA’03, LNCS 2612, Springer-Verlag, Berlin, 2003.

  
comments powered by Disqus

Copyright © 2018 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.