2016 IEEE Trustcom/BigDataSE/Ispa 2016
DOI: 10.1109/trustcom.2016.0130
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Quantitative Evaluation of Web Service Security

Abstract: -The number of web services available on the Internet has grown rapidly. Service consumers face a hard decision over which service to choose among the available ones. Security holds a key after various vulnerabilities have been exploited by attackers on number of notable web services. This paper carries out a survey on how security has been expressed and promised for web services, through both the Web Service Description Language and Service Level Agreements. It reviews existing technologies used for comparing… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…i) they use IP network that is host centric and cannot cater up any form of distributed communication system, which is the need of present age, ii) the policy of IP address is encountering exhaustion with the exponential rise of users, iii) no inclusion of security attributes (except IPv6 that offers distinct and unique IP addresses to promote security), iv) highly non-flexible posing difficult to incorporate new operation [13]. Therefore, web security has become one of the essential concerns among the network communities [14][15][16] and this leads to the formation of Future Internet Architecture (FIA) [17]. One of the essential parts of FIA is its security inclusion.…”
Section: Introductionmentioning
confidence: 99%
“…i) they use IP network that is host centric and cannot cater up any form of distributed communication system, which is the need of present age, ii) the policy of IP address is encountering exhaustion with the exponential rise of users, iii) no inclusion of security attributes (except IPv6 that offers distinct and unique IP addresses to promote security), iv) highly non-flexible posing difficult to incorporate new operation [13]. Therefore, web security has become one of the essential concerns among the network communities [14][15][16] and this leads to the formation of Future Internet Architecture (FIA) [17]. One of the essential parts of FIA is its security inclusion.…”
Section: Introductionmentioning
confidence: 99%
“…However, these approaches mainly focus on a single program that works in a centralized way. During the service composition, there may be several services with similar functions but developed by different mobile service providers, which requires us to select appropriate services for optimized performance [ 6 , 23 ]. It would be a resource-consuming work to evaluate all possible services by a single piece of equipment, which is hard to be implemented due to the energy-limited features of mobile terminals.…”
Section: Introductionmentioning
confidence: 99%
“…Traditional verification techniques cannot foresee all of these changes as they are mainly pre‐deployment activities. These challenges call for more effective approaches towards runtime monitoring of services …”
Section: Introductionmentioning
confidence: 99%