Share This Article:

SOAP-Based Security Interaction of Web Service inHeterogeneous Platforms

DOI: 10.4236/jis.2011.21001    4,565 Downloads   8,779 Views   Citations
Author(s)    Leave a comment


With the development and application of SOA technology, security issues of Web services based on heterogeneous platform have become increasingly prominent. The security of SOAP message is of great importance to Web service security. In order to solve the security issue of heterogeneous platforms, a security processing model named SIMSA (Security Interactive Model based on SOAP and Authentication) based on SOAP and authentication is proposed in this paper. By experimental verification, the model ensures the safety of SOAP message transmission and enhances the security of Web service in heterogeneous platforms.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

T. Xu and C. Yi, "SOAP-Based Security Interaction of Web Service inHeterogeneous Platforms," Journal of Information Security, Vol. 2 No. 1, 2011, pp. 1-7. doi: 10.4236/jis.2011.21001.


[1] F. Satoh, et al., “Adding Authentication to Model Driven Security,” IEEE International Conference on Web Services (ICWS), Chicago, 2006, pp. 585-594. doi:10.1109/ ICWS.2006.25
[2] K. Bhargavan, C. Fournet, et al., “An Advisor for Web Services Security Policies,” Proceedings of the 2005 workshop on Secure web services, New York, 2005, pp. 1-9. doi:10.1145/1103022.1103024
[3] S. Weber, P. Austel and M. McIntosh, “A Framework for Multi-Platform SOA Security Analyses,” IEEE International Conference on Web Service, Salt Lake City, 2007, pp. 102-109.
[4] J. Viega, “Why Applying Standards to Web Services is not Enough,” IEEE Security and Privacy, Vol. 4, No. 4, 2006, pp. 25-31. doi:10.1109/MSP.2006.110
[5] Z. P. Liu, D. D. Zhou, L. Y. Xue, X. M. Chang and X. J. Song, “A Security Model of Web Service Based on SOAP,” Journal of Wuhan University in Chinese, Vol. 52, No. 5, 2006, pp. 570-573.
[6] L. Y. Tang and S. H. Qing, “Administration of Multiple Roles in the Hybrid RBAC-DTE Policy,” Chinese Journal of Computers, in Chinese, Vol. 29, No. 8, 2006, pp. 1419-1425.
[7] X. M. Wang and Z. T Zhao, “Role-Based Access Control Model of Temporal Object,” Acta Electronica Sinica, in Chinese, Vol. 33, No. 9, 2005, pp. 1634-1638.
[8] W. F. Zheng, T. Xu and Q. F Gu, “Design and Implementation of Core Service in Civil Aviation Integrated Information Platform,” Computer Engineering, In Chi- nese, Vol. 34, No. 21, 2008, pp. 267-269.
[9] R. Bunge, S. Chung, B. Endicott-Popovsky and D. McLane, “An Operational Framework for Service Oriented Architecture Network Security,” Proceedings of the 41st Hawaii International Conference on System Sciences, Waikoloa, 2008, pp. 312-320.
[10] N. Bieberstein, S. Bose, M. Fiammante, K. Jones, R. Shah and Z. Ning, “Service-Oriented Architecture Gu- ide,” in Chinese, Posts & Telecom Press, Beijing, 2008, pp. 160-166.
[11] Z. P. Liu, X. M. Chang, D. D. Zhou and X. J. Song, “A Safe ID Authentication Policy in Web Service,” Journal of Computer Research and Development, in Chinese, Vol. 43, 2006, pp. 551-555.

comments powered by Disqus

Copyright © 2020 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.