Security Protocols for Outsourcing Database Services

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Protocols for Outsourcing Database Services

Advances in networking technologies and the continued growth of the Internet have triggered a new trend towards outsourcing data management and information technology needs to external service providers. As a recent manifestation of this trend, there has been growing interest in outsourcing database services in both the commercial world and the research community. Although the outsourced databa...

متن کامل

Extending WS-Security to Implement Security Protocols for Web Services

Web services use tokens provided by the WS-Security standard to implement security protocols. We propose several extensions to the WS-Security standard, including name types, key and random number extensions. The extensions are used to implement existing protocols such as ISO9798, Kerberos or BAN-Lowe. The advantages of using these implementations rather than the existing, binary ones, are inhe...

متن کامل

Data security services, solutions and standards for outsourcing

a r t i c l e i n f o Keywords: Web services Access control Inference control Identity management Mobile code security Globalization has resulted in outsourcing data, software, hardware and various services. However, outsourcing introduces new security vulnerabilities due to the corporation's limited knowledge and control of external providers operating in foreign countries. Security of operati...

متن کامل

Analysis of Security Techniques Applied in Database Outsourcing

Database Outsourcing is a nascent data management paradigm in which the data owner stores the confidential data at the third party service provider’s site. The service provider is responsible for managing and administering the database and allows the data owner and clients to create, update, delete and access the database. There are chances of hampering the security of the data due to untrustwo...

متن کامل

Towards Automated Execution of Security Protocols for Web Services

Existing solutions for authentication and authorization in Web services make use of technologies such as SAML or WS-Security. These provide a static solution by using a set of predefined protocols. We propose a dynamic approach for the automated execution problem by developing a semantic security protocol model from which security protocol specifications are generated and automatically executed...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information & Security: An International Journal

سال: 2006

ISSN: 0861-5160

DOI: 10.11610/isij.1805