Security Protocols for Outsourcing Database Services
نویسندگان
چکیده
منابع مشابه
Security Protocols for Outsourcing Database Services
Advances in networking technologies and the continued growth of the Internet have triggered a new trend towards outsourcing data management and information technology needs to external service providers. As a recent manifestation of this trend, there has been growing interest in outsourcing database services in both the commercial world and the research community. Although the outsourced databa...
متن کاملExtending WS-Security to Implement Security Protocols for Web Services
Web services use tokens provided by the WS-Security standard to implement security protocols. We propose several extensions to the WS-Security standard, including name types, key and random number extensions. The extensions are used to implement existing protocols such as ISO9798, Kerberos or BAN-Lowe. The advantages of using these implementations rather than the existing, binary ones, are inhe...
متن کاملData security services, solutions and standards for outsourcing
a r t i c l e i n f o Keywords: Web services Access control Inference control Identity management Mobile code security Globalization has resulted in outsourcing data, software, hardware and various services. However, outsourcing introduces new security vulnerabilities due to the corporation's limited knowledge and control of external providers operating in foreign countries. Security of operati...
متن کاملAnalysis of Security Techniques Applied in Database Outsourcing
Database Outsourcing is a nascent data management paradigm in which the data owner stores the confidential data at the third party service provider’s site. The service provider is responsible for managing and administering the database and allows the data owner and clients to create, update, delete and access the database. There are chances of hampering the security of the data due to untrustwo...
متن کاملTowards Automated Execution of Security Protocols for Web Services
Existing solutions for authentication and authorization in Web services make use of technologies such as SAML or WS-Security. These provide a static solution by using a set of predefined protocols. We propose a dynamic approach for the automated execution problem by developing a semantic security protocol model from which security protocol specifications are generated and automatically executed...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information & Security: An International Journal
سال: 2006
ISSN: 0861-5160
DOI: 10.11610/isij.1805