• Jun 14, 2017 News!Vol.8, No.5 has been indexed by EI (Inspec).   [Click]
  • Nov 09, 2017 News!Vol.9, No.5 has been published with online version. 16 peer reviewed articles from 11 specific areas are published in this issue.   [Click]
  • Jul 19, 2017 News!Vol.9, No.4 has been published with online version. 16 peer reviewed articles from 16 specific areas are published in this issue.   [Click]
General Information
Editor-in-chief
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2010 Vol.2(6): 919-924 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2010.V2.264

Realization of Threats and Countermeasure in Semantic Web Services

Mr. Suresh Kumar *, Mr. Rakesh Kumar Prajapati *, Dr. Manjeet Singh ** and Asok De*

Abstract—Semantic Web services (SWS) are worn by large number of companies as they rendering products and services to customers and business partners throughout the Internet and corporate extranets. The security necessities for these service providers are of supreme importance. Platform-based security services are provided by operating system. Internet Information Services can be used to offer point-to-point business solutions. However message based architecture of SWS is increasingly being used, so new challenges automatically inherited from previous one. All these scenarios require security to be deal with at the message level, transmission level and mutual authentication to carry out cross-platform interoperability and routing through multiple middle level agent nodes. Semantic Web service environment (SWSE) need to implement different level security solutions for including authentication, identification, privacy and data integrity. The threats of network eavesdropping or information disclosure at intermediate application nodes must be addressed if our SWS requests or responses messages convey sensitive application data as credit card numbers, SSN number, employee details, and so on. We will discuss various categories of vulnerabilities and find out causes of threats. Countermeasures will be part of our discussion like Symmetric encryption using shared keys, asymmetric encryption using X.509 certificates, and Digital signature.

Index Terms—SWS, threats, security, SOAP, XML, X-KRSS, digital certificates, encryption

Ambedkar Institute of Technology, New Delhi (India)*, YMCA University of Science & Technology Faridabad (India) **.
sureshpoonia@yahoo.com, rkp.its@gmail.com, mstomar2000@yhaoo.com, asok.de@mail.com

[PDF]

Cite: Mr. Suresh Kumar, Mr. Rakesh Kumar Prajapati, Dr. Manjeet Singh and Asok De, "Realization of Threats and Countermeasure in Semantic Web Services," International Journal of Computer Theory and Engineering vol. 2, no. 6, pp. 919-924, 2010.  

Copyright © 2008-2015. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@vip.163.com