Service Oriented Architectures (SOAs) with underlying technologies like web services and web services orchestration have opened the door to a wide range of novel application scenarios, especially in the context of inter-organizational cooperation and business process integration. Applications built on web service technologies use plenty of standards like WS-security for the fulfillment of security requirements like confidentiality and integrity and eXtensbile Access Control Markup Language (XACML) for the specification of access policies to name a few. These open standards enable the...
Service Oriented Architectures (SOAs) with underlying technologies like web services and web services orchestration have opened the door to a wide ran...
Security issues in a networked environment include threats to either end-point and the conduit between them. Issues related to enterprise servers and communication channels have been studied at length in subjects such as cryptography and system security. Client ends in any networked scenario have received little attentions in security studies. Hence, clients have become the target of malicious activities on the larger networks such as the Internet. Trusted Computing aims to address client side security concerns using hardware-based security. Remote attestation is an essential characteristic...
Security issues in a networked environment include threats to either end-point and the conduit between them. Issues related to enterprise servers and ...