scholarly journals Security Personalization for Internet and Web Services

Author(s):  
George Yee ◽  
Larry Korba

The growth of the Internet has been accompanied by the growth of Internet services (e.g., e-commerce, e-health). This proliferation of services and the increasing attacks on them by malicious individuals have highlighted the need for service security. The security requirements of an Internet or Web service may be specified in a security policy. The provider of the service is then responsible for implementing the security measures contained in the policy. However, a service customer or consumer may have security preferences that are not reflected in the provider’s security policy. In order for service providers to attract and retain customers, as well as reach a wider market, a way of personalizing a security policy to a particular customer is needed. We derive the content of an Internet or Web service security policy and propose a flexible security personalization approach that will allow an Internet or Web service provider and customer to negotiate to an agreed-upon personalized security policy. In addition, we present two application examples of security policy personalization, and overview the design of our security personalization prototype.

2011 ◽  
pp. 1929-1950
Author(s):  
George O.M. Yee

The growth of the Internet has been accompanied by the growth of Web services (e.g., e-commerce, e-health, etc.), leading to important provisions put in place to protect the privacy of Web service users. However, it is also important to be able to estimate the privacy protection capability of a Web service provider. Such estimates would benefit both users and providers. Users would benefit from being able to choose (assuming that such estimates were made public) the service that has the greatest ability to protect their privacy (this would in turn encourage Web service providers to pay more attention to privacy). Web service providers would benefit by being able to adjust their provisions for protecting privacy until certain target capability levels of privacy protection are reached. This article presents an approach for estimating the privacy protection capability of a Web service provider and illustrates the approach with an example.


Author(s):  
George Yee

The growth of the Internet has been accompanied by the growth of Web services (e.g., e-commerce, e-health, etc.), leading to important provisions put in place to protect the privacy of Web service users. However, it is also important to be able to estimate the privacy protection capability of a Web service provider. Such estimates would benefit both users and providers. Users would benefit from being able to choose (assuming that such estimates were made public) the service that has the greatest ability to protect their privacy (this would in turn encourage Web service providers to pay more attention to privacy). Web service providers would benefit by being able to adjust their provisions for protecting privacy until certain target capability levels of privacy protection are reached. This article presents an approach for estimating the privacy protection capability of a Web service provider and illustrates the approach with an example. [Article copies are available for purchase from InfoSci-on-Demand.com]


2010 ◽  
pp. 556-564
Author(s):  
Khaled M. Khan

Web service is becoming an important area of business processing and research for enterprise systems. Various Web service providers currently offer diverse computing services ranging from entertainment, finance, and health care to real-time application. With the widespread proliferation of Web Services, not only delivering secure services has become a critical challenge for the service providers, but users face constant challenges in selecting the appropriate Web services for their enterprise application systems. Security has become an important issue for information systems (IS) managers for a secure integration of Web services with their enterprise systems. Security is one of the determining factors in selecting appropriate Web services. The need for run-time composition of enterprise systems with third-party Web services requires a careful selection process of Web services with security assurances consistent with the enterprise business goal. Selection of appropriate Web services with required security assurances is essentially a problem of choice among several alternative services available in the market. The IS managers have little control of the actual security behavior of the third-party Web services, however, they can control the selection of right services which could likely comply their security requirements. Selecting third-party Web services arbitrarily over the Internet is critical as well as risky.


Author(s):  
Khaled M. Khan

Web service is becoming an important area of business processing and research for enterprise systems. Various Web service providers currently offer diverse computing services ranging from entertainment, finance, and health care to real-time application. With the widespread proliferation of Web Services, not only delivering secure services has become a critical challenge for the service providers, but users face constant challenges in selecting the appropriate Web services for their enterprise application systems. Security has become an important issue for information systems (IS) managers for a secure integration of Web services with their enterprise systems. Security is one of the determining factors in selecting appropriate Web services. The need for run-time composition of enterprise systems with third-party Web services requires a careful selection process of Web services with security assurances consistent with the enterprise business goal. Selection of appropriate Web services with required security assurances is essentially a problem of choice among several alternative services available in the market. The IS managers have little control of the actual security behavior of the third-party Web services, however, they can control the selection of right services which could likely comply their security requirements. Selecting third-party Web services arbitrarily over the Internet is critical as well as risky.


2011 ◽  
Vol 08 (04) ◽  
pp. 291-302
Author(s):  
RAVI SHANKAR PANDEY

Web services are programs which perform some elementary business process of an application and are distributed over the Internet. These services are described, discovered and executed using standard languages WSDL, SOAP and UDDI. Proliferation of web services has resulted in intense competition between providers, which provide the same service. To survive in such a competitive environment, they need to advertise the quality of their service. Web service description language does not provide support to describe quality attributes. Recently, DAmbrogio proposed QOS model of web services based on a meta model of WSDL. In this paper, we present a platform to advertise QOS as declared by the service provider. This tool generates a WSDL file from Java code along with its quality of service attributes. It accepts Java code and a file containing quality attributes. These attributes include reliability, availability, and operation demand and operation latency. These attributes are included in WSDL file as a content of description element.


JURTEKSI ◽  
2019 ◽  
Vol 3 (2) ◽  
pp. 70-75
Author(s):  
Mohd Siddik

AbstrakPenggunaan internet saat ini semakin meluas, dengan mudah berbagai informasi kita temukandi internet, mulai dari ilmu pengetahuan, bisnis, komunitas sampai informasi yang menjurus kepadakonten negatifpun sering di jumpai. Tidak semua informasi yang ada di internet positif, tak jaranginformasi negatif banyak ditemukan, bahkan informasi yang berkonten negatif terkadang merugikanpengguna internet. Untuk bisa terkoneksi ke internet ada banyak layanan internet yang bisa digunakan,pastinya layanan tersebut sudah terhubung dengan ISP (internet service provider) atau jasa penyedialayanan internet. Jaringan LAN adalah konsep jenis jaringan yang banyak digunakan dalampendistribusian layanan internet. Saat ini pendistribusian layanan internet sudah semakin meluas, mulaidari instansi pemerintah, perusahaan, sekolah bahkan sampai café untuk sekedar minum kopi pun takluput dari layanan internet, untuk itu perlu melakukan filterisasi terhadap situs web yang berkontennegatif. Dalam penelitian ini penulis menjelaskan bagaimana proses blok situs dengan menggunakanhardware Mikrotik Routerboar 750 yang digunakan sebagai firewall, yang nantinya dimplementasikanpada jaringan LAN.Kata Kunci: Blok Situs Web, Internet, Jaringan LAN, MikrotikAbstractTh e use of the Internet today is widespread, with easy information we find on the internet,ranging from science, business, community to information that leads to negative content is oftenencountered. Not all of the information on the internet is positive, there is not enough negativeinformation to be found, even negative content information is sometimes detrimental to internet users. Tobe connected to the internet there are many internet services that can be used, of course the service isalready connected with the ISP (internet service provider) or service providers internet. LAN network is aconcept of network type that is widely used in the distribution of internet services. Currently thedistribution of Internet services has been increasingly widespread, ranging from government agencies,companies, schools and even the café to just drink coffee did not escape the internet service, for it needsto do the filtering of websites that berkonten negative. In this study the authors explain how the site blockprocess using Mikrotik Routerboar 750 hardware used as a firewall, which will be implemented on theLAN network.Keywords: Internet, LAN Network, Mikrotik, Web Site Block


2011 ◽  
pp. 1113-1120
Author(s):  
Khaled M. Khan

Web service is becoming an important area of business processing and research for enterprise systems. Various Web service providers currently offer diverse computing services ranging from entertainment, finance, and health care to real-time application. With the widespread proliferation of Web Services, not only delivering secure services has become a critical challenge for the service providers, but users face constant challenges in selecting the appropriate Web services for their enterprise application systems. Security has become an important issue for information systems (IS) managers for a secure integration of Web services with their enterprise systems. Security is one of the determining factors in selecting appropriate Web services. The need for run-time composition of enterprise systems with third-party Web services requires a careful selection process of Web services with security assurances consistent with the enterprise business goal. Selection of appropriate Web services with required security assurances is essentially a problem of choice among several alternative services available in the market. The IS managers have little control of the actual security behavior of the third-party Web services, however, they can control the selection of right services which could likely comply their security requirements. Selecting third-party Web services arbitrarily over the Internet is critical as well as risky.


Author(s):  
Deepti Parachuri ◽  
Sudeep Mallick

Security is of fundamental concern in computing systems. This chapter covers the role of security policies in Web services. First, it examines the importance of policies in web services and explains the WS-Policy standard. It also highlights the relation of WS-Policy with other WS-* specifications. Next, it covers different facets of security requirements in SOA implementations. Later, it examines the importance of security policies in web services. It also presents the basic concepts of WS-Security policy language. WS-Security policy specification specifies a standard way to define and publish security requirements in an extensible and interoperable way. A service provider makes use of security policy to publish the security measures implemented to protect the service. Security policies can also be made customizable to meet the security preferences of different consumers. Towards the end, it discusses about the governance of security polices and also future trends in security policies for web services.


2008 ◽  
pp. 50-70
Author(s):  
Barbara Carminati ◽  
Elena Ferrari ◽  
Patrick Hung

Web service security is today receiving growing attention, and enterprises are realizing that effective security management is essential for earning and maintaining trust in their services. One of the major benefits of Web services is that it is possible to dynamically combine different services together to form a more complex service. Also, in this case, security issues are a primary concern. In this chapter, we focus on security issues that arise when composing Web services. We first provide an overview of the main security requirements that must be taken into account when composing Web services. Then, we survey literature and standards related to Web services composition. Finally, we present a proposal for a brokered architecture on support of the secure composition of Web services.


Author(s):  
Hossein Kardan Moghaddam ◽  
Hossein Niavand

In this article, we have compared the internet services offered by Internet Service Providers in Iran and India during 2009/2011. We have also tried to analyze and compare speed of internet, amount of internet/broadband usage in India and Iran. We have also tried to analyze and compare the number of social network users in India, Iran and other countries. We have also analyzed the strength and weakness of all these things.


Sign in / Sign up

Export Citation Format

Share Document