Towards secure SOAP message exchange in a SOA

Author(s):  
Mohammad Ashiqur Rahaman ◽  
Andreas Schaad ◽  
Maarten Rits
2015 ◽  
Vol 137 (2) ◽  
pp. 253-271
Author(s):  
Wuhui Chen ◽  
Incheon Paik ◽  
Patrick C.K. Hung

2014 ◽  
Vol 1 (1) ◽  
pp. 9-34
Author(s):  
Bobby Suryajaya

SKK Migas plans to apply end-to-end security based on Web Services Security (WS-Security) for Sistem Operasi Terpadu (SOT). However, there are no prototype or simulation results that can support the plan that has already been communicated to many parties. This paper proposes an experiment that performs PRODML data transfer using WS-Security by altering the WSDL to include encryption and digital signature. The experiment utilizes SoapUI, and successfully loaded PRODML WSDL that had been altered with WSP-Policy based on X.509 to transfer a SOAP message.


2021 ◽  
Vol 35 (2) ◽  
Author(s):  
Yehia Abd Alrahman ◽  
Nir Piterman

AbstractWe propose a formalism to model and reason about reconfigurable multi-agent systems. In our formalism, agents interact and communicate in different modes so that they can pursue joint tasks; agents may dynamically synchronize, exchange data, adapt their behaviour, and reconfigure their communication interfaces. Inspired by existing multi-robot systems, we represent a system as a set of agents (each with local state), executing independently and only influence each other by means of message exchange. Agents are able to sense their local states and partially their surroundings. We extend ltl to be able to reason explicitly about the intentions of agents in the interaction and their communication protocols. We also study the complexity of satisfiability and model-checking of this extension.


Author(s):  
K. G. Yashchenkov ◽  
K. S. Dymko ◽  
N. O. Ukhanov ◽  
A. V. Khnykin

The issues of using data analysis methods to find and correct errors in the reports issued by meteorologists are considered. The features of processing various types of meteorological messages are studied. The advantages and disadvantages of existing methods of classification of text information are considered. The classification methods are compared in order to identify the optimal method that will be used in the developed algorithm for analyzing meteorological messages. The prospects of using each of the methods in the developed algorithm are described. An algorithm for processing the source data is proposed, which consists in using syntactic and logical analysis to preclean the data from various kinds of noise and determine format errors for each type of message. After preliminary preparation the classification method correlates the received set of message characteristics with the previously trained model to determine the error of the current weather report and output the corresponding message to the operator in real time. The software tools used in the algorithm development and implementation processes are described. A complete description of the process of processing a meteorological message is presented from the moment when the message is entered in a text editor until the message is sent to the international weather message exchange service. The developed software is demonstrated, in which the proposed algorithm is implemented, which allows to improve the quality of messages and, as a result, the quality of meteorological forecasts. The results of the implementation of the new algorithm are described by comparing the number of messages containing various types of errors before the implementation of the algorithm and after the implementation.


2018 ◽  
Vol 60 (5-6) ◽  
pp. 253-261
Author(s):  
Uwe Roth ◽  
Theophane Ngne Djoua

Abstract In this article, we propose an architecture that allows to exchange messages or data via a blockchain solution, while keeping the business process independent from the concrete blockchain. The project is the consequence of a need to have fast development of a blockchain based proof of concept that shows the feasibility of a business process, while knowing that in a future step the underlying blockchain solution has to be replaced for reasons of licensing or maximal data throughput. This is done by providing an architecture on base of layers, similar to the OSI-model, and encapsulates the used blockchain within a wrapper layer that covers all blockchain specific properties and only provides a transparent view on the reading or writing from and to the blockchain. The higher layers re-implement point-to-point communication and introduce confidentiality by the use of encryption techniques. The architecture has been tested and proven by implementing two different blockchain solutions that are shielded by specific wrapper layer implementations. This wrapper layer is responsible for the fragmentation of the sent data and their encapsulation into the concrete blockchain solution. The reconstruction of the data takes care of the data fragments being sent potentially out of order or being incomplete. A payload layer is introduced to provide point-to-point communication and to embed the main message inside a message structure. In collaboration with underlying layer it identifies for which message one is not the addressee and allow the underling layer to stop collecting unnecessary data. A crypto-layer finally provides ways of encrypting messages for one or many recipients. Having fixed layers not only allows to replace the underlying blockchain solution but also to extend or replace the other layers in case new security features or optimized protocols need to embedded. The proposed solution does not allow to use specific features like smart contracts and only provides undeniable tamper-proofed existence of a sent message.


Sign in / Sign up

Export Citation Format

Share Document