DOI QR코드

DOI QR Code

A Security Enhancement Method for Web Service

웹서비스 보안성 강화 방안

  • Received : 2013.10.21
  • Accepted : 2013.12.20
  • Published : 2013.12.28

Abstract

As the Internet has been growing, WWW(World Wide Web) based services were popularized and users using the service were increased excessively. Recently, the instances of communications between the applications and interaction applications using the Web services in the implementation of the business logics among the enterprises are spread widely. Therefore, it has been emphasized quality and security of web services. In this paper, we described standard trends for web servises. And we analyzed the security policies to protect user's informations. Eventually, We described a security enhancement method for web service.

최근 인터넷이 발전함에 따라 월드와이드웹(world wide web) 기반의 서비스 규모는 기하급수적으로 증가하였다. 또한 최근 기업간 비즈니스 로직의 구현에 웹 서비스를 이용하고 응용 간 통신 및 상호 응용의 사례가 많아지고 있으며 이를 위한 기업 내의 기반 시스템 구축에도 웹 서비스의 이용이 활발해지고 있다. 이에 따라 인터넷을 이용한 웹서비스에서 다루어지는 정보의 품질에 대한 중요성이 증대되고 있으며, 다양하고 방대한 정보에 대한 보안 역시 점점 더 중요성을 띄고 있다. 따라서 본 연구에서는 웹서비스에 대한 표준 동향들을 고찰하고, 사용자들의 정보를 보호하기 위한 다양한 보안정책들을 분석하였다. 이를 기반으로 웹서비스의 보안성을 강화하기 위한 방안을 기술하였다.

Keywords

References

  1. M.P. Papazoglou and D. Georgakopoulos, "Service-Oriented Computing," CACM, Vol. 46, No. 10, Oct 2003.
  2. W3C, Web Services Architecture, http://www.w3.org/ TR/2003/WD-ws-arch-20030808/
  3. F. Curbera et. al., "Unraveling the Web Services Web: An Introduction to SOAP, WSDL, and UDDI," IEEE Internet Computing, Vol. 6, No. 2, pp. 86-93, March/April 2002.
  4. W3C, Web Services Description Language(WSDL) 1.1, 2001, http://www.w3c.org/TR/wsdl
  5. W3C, Simple Object Access Protocol (SOAP) 1.1. 2000, http://www.w3c.org/TR/SOAP.
  6. P. Baglietto, M. Maresca, A. Parodi and N. Zingirian, "Deployment of Service Oriented Architecture for a Business Community," In Proc. of the Sixth International ENTERPRISE DISTRIBUTED OBJECT COMPUTING (EDOC'02), 2002.
  7. T. Erl. Service-Oriented Architecture (SOA): Concepts, Technology, and Design. Prentice Hall, 2005.
  8. G. Alonso, F. Casati, H. Kuno, and V. Machiraju. Web Services Concepts, Architectures and Applications Series: Data-Centric Systems and Applications. Addison-Wesley Professional,, 2002.
  9. Jin-Su Park, "Enterprise Web Service Development", HongRung Publishing Company, 2004.
  10. A. K. Jain, A. Ross, and S. Pankanti, "A prototype hand geometry-based verification system," 2nd Int'l Conference on Audio- and Video-based Biometric Person Authentication, Washington D.C., pp. 161-171, March 22-24, 1999.
  11. N. Ratha, J. Connell, and R. Bolle, "Enhancing Security and Privacy in Biometrics-based Authentication Systems," IBM Systems Journal, Vol. 40, No. 3, pp. 614-634, 2001. https://doi.org/10.1147/sj.403.0614
  12. N. Ratha, J. Connell, and R. Bolle, "Cancelable Biometrics," Biometric Consortium, 2000.
  13. J. Cambier, et. al., "Application-Specific Biometric Templates," Proc. of AutoID, pp.167-171, 2002.

Cited by

  1. Pelvic Compression Belt Convergence Impact on the Thickness of Multifidus and Erector Spinae Muscles vol.7, pp.5, 2016, https://doi.org/10.15207/JKCS.2016.7.5.051
  2. The Convergence Study on the Effects of Three Pelvic Floor Muscle Excercise on Thickness of Pelvic Floor Muscle and Abdominal Muscles vol.7, pp.1, 2016, https://doi.org/10.15207/JKCS.2016.7.1.105
  3. Design of High Speed Data Acquisition and Fusion System with STM32 Processor vol.7, pp.1, 2016, https://doi.org/10.15207/JKCS.2016.7.1.009
  4. The Effect of PNF Stretching with Elastic Band on Ball Speed of High School Baseball Players vol.14, pp.12, 2016, https://doi.org/10.14400/JDC.2016.14.12.525