Volume 2 Number 2 June 2011

    
A Security Architecture for Web Services

Hikmat Farhat, Khalil Challita

https://doi.org/

Abstract Web services are quickly becoming the most popular tool for distributed computing. Due to this popularity a comprehensive security architecture is needed. In this paper we introduced such a comprehensive architecture that includesin addition to the standard services of integrity and confidentiality- authentication, authorization and a defense against denial of service attacks. This model builds on existing standards such as... Read More


An XML Access Control Model Considering Update Operations

Meghdad Mirabi, Hamidah Ibrahim, Leila Fathi, Nur Izura Udzir, Ali Mamat

https://doi.org/

Abstract Several researches have been proposed over the past years to specify a selective access control for XML document. However, most of the previous researches only consider read privilege while specifying XML access control when access control policies support update rights is untouched. Therefore, a challenging issue is how to define an XML access control model to handle update operations that... Read More


Comparison Between PKI (RSA-AES) and AEAD (AES-EAX PSK) Cryptography Systems For Use in SMS-based Secure Transmissions

Hao Wang, William Emmanuel Yu

https://doi.org/

Abstract In today’s mobile communication systems, security offered by the network operator is often limited to the wireless link. This means that data delivered through mobile networks are not sufficiently protected. In the particular growing field of interest of machine-to-machine (M2M) communications, these applications typically require a mobile, secure and reliable means of data communication. This paper compared two (2) cryptographic... Read More


Pitfalls of Devising a Security Policy in Virtualized Hosts

Dennis C. Guster, Olivia F. Lee, Dustin C. Rogers

https://doi.org/

Abstract The paper provides an overview of three common virtualization threats that have been observed in log files in the authors' network and suggests solutions to mitigate those security vulnerabilities. The solutions offered have been implemented on a network with over 200 hosts 40 of which are virtualized.... Read More


A Privacy-Aware, Decentralized, End-to-End, CFG-based Regression Test Selection Framework for Web Services using only Local Information

Michael Ruth, Curtis Rayford, Jr.

https://doi.org/

Abstract Web services are composable, interoperable, and autonomous which means that a single web service interaction could involve services written in several different languages provided by several different service providers. Such interactions hamper the development of RTS techniques because RTS techniques generally require some form of implementation details which service providers in separate autonomous systems are unlikely to expose. In this... Read More