Title :
Multi-Tier Security Feature Modeling for Service-Oriented Application Integration
Author :
Zhao, Fengyu ; Peng, Xin ; Zhao, Wenyun
Author_Institution :
Sch. of Comput. Sci., Fudan Univ., Shanghai, China
Abstract :
In service oriented architecture (SOA) environment, the communication and infrastructure security is crucial. The most important specification addressing Web services security is WS-Security, which collaborates with the SOAP message specifications, providing integrity, confidentiality and authentication for Web services. However, WS-Security focuses SOAP message security between trusted partners. In SOA applications, there are other vulnerabilities which can be exploited to attack by anonymous customer or even trusted partners, and these vulnerabilities do not gain enough attention as WS-Security. Among them, denial-of-service (DoS) is one attack cluster, which exhausts computer and network resources and reduces the availability of Web services. Another one is sensitive data leakage in a specific application domain. In this paper, the security of SOA applications is viewed as the security domain and a three-tier domain was divided based on security domain analysis. For each security sub-domain, security requirement scenario and requirements are presented. The security domain models were given which can be used to build up security services for sub-domain. Based on security model and security service assets, which can evolve along with understanding on security domain, the developers can establish the security implementation for SOA application integration.
Keywords :
Web services; formal specification; message authentication; software architecture; DoS; SOA; SOAP message specification; WS-security; Web service; denial-of-service attack; message authentication; multitier security feature modeling; sensitive data leakage; service oriented architecture application integration; software architecture; specific application domain; Application software; Authentication; Availability; Collaboration; Computer crime; Computer networks; Data security; Service oriented architecture; Simple object access protocol; Web services; DoS attacks; SOA security; Security architecture; Web services firewall;
Conference_Titel :
Computer and Information Science, 2009. ICIS 2009. Eighth IEEE/ACIS International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-0-7695-3641-5
DOI :
10.1109/ICIS.2009.80