2009 Congress on Services - I 2009
DOI: 10.1109/services-i.2009.95
|View full text |Cite
|
Sign up to set email alerts
|

Quality of Security Service for Web Services within SOA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…In the case of an SOA-based program, information leakage will not be just because of interference among the low-security sensitive and high-security sensitive variables but other architectural parameters will also play a crucial role in the quantification of information leakage. The detail about the SOA and attacks related to SOA are discussed in detail in [24] and [16,25] respectively. In SOA, the parameters like network link will be outside of the closed system.…”
Section: Program Executes In Service Oriented Architecture (Soa)mentioning
confidence: 99%
“…In the case of an SOA-based program, information leakage will not be just because of interference among the low-security sensitive and high-security sensitive variables but other architectural parameters will also play a crucial role in the quantification of information leakage. The detail about the SOA and attacks related to SOA are discussed in detail in [24] and [16,25] respectively. In SOA, the parameters like network link will be outside of the closed system.…”
Section: Program Executes In Service Oriented Architecture (Soa)mentioning
confidence: 99%
“…The privacy level quantifies the risk of disclosure of user information based on three dimensions: visibility, sensitivity and retention time. Quantifying privacy levels comes from security levels addressed by El-Yamany which quantifies security levels [22]. From privacy definition, we define for each data item, who access it, and for what purpose as the following: What = (Name, Email, Phone, Address, National ID, Credit card) Who = (Trusted person, Marketing dept., All) Purpose = (Marketing project, All) How long = (short, long, always) Table 1 shows the proposed taxonomy for privacy access rights.…”
Section: Extended Web Service Privacy Negotiation Frameworkmentioning
confidence: 99%
“…Each privacy constraint as defined in section 4.1 has a different value for each level of service. This expansion of the SLA with QoS privacy parameters was inspired by our previous work in creating metadata for Quality of Security Service (QoSS) for SOA [26]. The constraints in each QoS level are flexible, and can be changed to meet the requirements of any Cloud Computing environment.…”
Section: Privacy Quality Of Service Levelsmentioning
confidence: 99%