Solutions for 3 Security Problems and its Application in SOA-FCA Service Components Based SDO
Nannan Wang, Zhiyi Fang, Kaige Yan, Yu Tang, Xingchao An
DOI: 10.4236/ijcns.2010.310109   PDF    HTML     4,286 Downloads   8,021 Views   Citations


Service-Oriented Architecture (SOA), which is an open architecture, provides developers with more freedom. However, its security problem goes from bad to worse. By taking an insurance business in Formal Concept Analysis (SOA-FCA) Service Components based Service Data Object (SDO) data model transfer with proxy as an example, the security issue of SDO data model was analyzed in this paper and this paper proposed a mechanism to make sure that the confidentiality, integrity, and non-repudiation of SDO data model are preserved by applying encryption/decryption, digest, digital signature and so on. Finally, this mechanism was developed and its performance was evaluated in SOA-FCA Service Components.

Share and Cite:

N. Wang, Z. Fang, K. Yan, Y. Tang and X. An, "Solutions for 3 Security Problems and its Application in SOA-FCA Service Components Based SDO," International Journal of Communications, Network and System Sciences, Vol. 3 No. 10, 2010, pp. 811-815. doi: 10.4236/ijcns.2010.310109.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] T. Erl, “Service-Oriented Architecture (SOA): Concepts, Technology, and Design,” Prentice Hall PTR, Upper Saddle River, New Jersey, 2005.
[2] B. Portier and F. Budinsky, “Introduction to SDO,” IBM developerWorks, 2004.
[3] M. John, “Security Models: Encyclopedia of Software Engineering,” Wiley Press, 1994.
[4] M. Benedikt, C. Cheeyonyong, W. F. Fan, et al, “Capturing Both Types and Constraints in Data Integration,” Proceedings of the ACM SIGMOD International Conference on Management of Data, San Diego, California, USA, 2003, pp. 277-288.
[5] D. Chaum and H. Van Antwerpen, “Undeniable Signatures,” Advances in Cryptology-CRYPTO’89, LNCS 435. Berlin: Springer-Verlag, 1989.
[6] S. W. Galbraith, “Invisibility and Anonymity of Undeniable and Confirmer Signatures,” Topics in Cryptology- CT-RSA’03, LNCS 2612, Springer-Verlag, Berlin, 2003.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.