SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. V (May – Jun. 2015), PP 35-39
www.iosrjournals.org
DOI: 10.9790/0661-17353539 www.iosrjournals.org 35 | Page
Algorithm for Securing SOAP Based Web Services from WSDL
Scanning Attacks
Mohamed Ibrahim B1
, Mohamed Shanavas A R2
1
Software Solution Architect & Research Scholar
2
Associate Professor, Jamal Mohamed College, Tiruchirappalli, India
Abstract: The Web Services are the emerging paradigm of Service Oriented Architecture (SOA) in the modern
enterprise computing to achieve interconnection of related applications in an organization in terms of services.
A service is a Software component which fulfills a defined functionality and does not depend on the context of
other services. In programming terms, the service is called as web method which is a function that accepts input
parameters and returns the output. The data types of input/output parameters may be simple or complex. In SOA
architecture, the list of web methods that a web service offers and the data types of their input/output
parameters are described using Web Services Description Language (WSDL) standard and published to
Universal Description, Discovery and Integration (UDDI) service registry where the web services clients search
the service registry for obtaining the required WSDL and start binding to the web server. The WSDL is prone
for SOA attacks as the WSDL is represented in XML format which is a plain text. Even though few researchers
proposed solutions for WSDL, those solutions are inadequate concerning to the modern communication
technologies and they are not able to achieve any landmark in providing security for WSDL attacks. This paper
proposes a new algorithm for preventing WSDL attacks which uses the existing security standards such as
Public Key Infrastructure (PKI), Digital Signatures, and XML Encryption/Decryption standards.
Keywords - SOA, Web Services, Security, WSDL, PKI, Computer Networks
I. Introduction
In order to integrate the related applications in an enterprise, several standards such as RMI, CORBA
and DCOM are used earlier. These standards adhere to the Service Oriented Architecture (SOA) where a service
is a component in an application which fulfills the defined functionality where it does not depend on the context
of other services. However, these standards belong to specific vendors and depend on the languages, platforms
and machine architectures. The Web Services are the emerging model in SOA which uses standard Internet
protocols for communication between web server and its clients. The Internet protocols are supported by
majority of machine architectures and platforms and the web services use simple XML format for data
exchange. As all the modern programming languages are comfortable to parsing XML formats, web services
can be developed and maintained in any language, thus provides language independent.
The list of available services, their input/output parameters and data types are described using Web
Services Description Language (WSDL). The WSDL is a standard recommended by World Wide Web
Consortium (W3C). The latest version of WSDL is 2.0 [1] and its previous standard version is 1.2 [2], where the
structures of both versions are different. The web service descriptions are published in Service Registry using
Universal Description, Discovery and Integration (UDDI) standard where the web service clients will look into
this registry for the required service description and start communicating with service provider. Thus the
standard SOA architecture contains three important components: (i) Service Provider, (ii) Service Registry and
(iii) Client. The three different basic operations that can be performed in SOA architecture are: (i) Publish by
Service Provider to Service Registry, (ii) Find by Client from Service Registry and (iii) Bind by Client to
Service Provider [3].
In this paper, we concentrate on providing security for “publish” and “find” part of SOA architecture,
i.e. protecting WSDL operations in order to prevent attackers to attack web services by gaining advantage of
interpreting WSDL content which is in plain text format.
This paper is organized as: Section 2 reviews the available literature for WSDL attack prevention, the
proposed algorithm for protecting SOAP web services from WSDL attacks is explained along with proof-of-
concept and result analysis in Section 3, and Section 4 concludes the paper.
II. Literature Review
Reviewing literature, we can see many researchers shown interest in protecting message level attacks,
which may occur during web service request and response between web service client and web service provider.
Only very less researchers are provided solutions for WSDL attacks. In fact, the WSDL attacks are severe which
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
DOI: 10.9790/0661-17353539 www.iosrjournals.org 36 | Page
may halt the entire web services down and provides opportunity for attackers to retrieve sensitive information of
the organization.
Mirtalebi et al. [4, 5] and Narges et al. [6, 7] proposed security solutions in the form of framework for
defending WSDL attacks. Both the researchers use the symmetric key cryptography for securing the WSDL
content before publishing it to service registry. However the key maintenance methods and key exchange
mechanisms in order to receive the symmetric from the service provider are not clearly defined in their papers.
The security solutions that are provided by vendors only work as part of their products and they have
few implementation constraints. At present, there is no comprehensive security solution defined for preventing
WSDL attacks.
III. Proposed Algorithm for Preventing WSDL attacks
The proposed algorithm uses the XML encryption standard to protect the WSDL scanning attacks on
the SOAP based web services. It does not aim to encrypt the entire WSDL which is represented XML format,
but only the critical portion through which the attacks can interpret the important information of the defined
services such as the exposed service names along with their input/output parameters.
The custom security elements are added with WSDL segment in order to notify the clients the retrieved
WSDL from the service registry is encrypted and the clients are needed to descript before they bind to the web
server. The security algorithm use symmetric key cryptography for encrypting the content of the WSDL and
asymmetric key cryptography for validating service provider/service requester of web service. The hashing
algorithm such as MD5/SH-1 is applied to ensure the message integrity of the WSDL content transmission.
It is assumed that the service provider and requester trust on the same Certificate Authority (CA) in
order to create and validate digital signatures. To maintain the digital certificates, the existing PKI and XMKS
standards are used.
The proposed algorithm uses the existing security standards as stated below.
 Symmetric Key Cryptography for encrypting the WSDL content at Service Provider [8].
 Hashing Algorithm for generating digest for ensuring message integrity to check whether the received
message at the web service client is not altered by the intermediate nodes passed through from service
registry.
 Public Key Infrastructure (PKI) and XML Key Management System (XKMS) are used for maintaining
private/public keys of using asymmetric key cryptography. Private Key is used for encryption and Public
Key is used for decryption, and vice versa [9, 10]
 Digital Signatures for ensuring the request/response is from right resource [11].
 Certificate Authority (CA) for maintaining digital certificates used for digital signatures.
 A new Software component named “Intelligent Security Engine (ISE)” is introduced at Service Provider
end which is the implementation of the proposed security algorithm at server side.
 The ISE can be placed in a proxy server so that it can serve for many web servers in which different web
services are running. Even it can be attached to Enterprise Service Bus (ESB) network, through which
security can be applied to the entire Enterprise Application Integration (EAI) components.
The proposed security algorithm for protecting SOAP web services from WSDL attacks are given in
Figure 1 and Figure 2 respectively for service provider and service requester side. The flow chart representation
of the proposed algorithm is outlined in Figure 3.
As proof-of-concept (POC), the proposed algorithm is implemented using Java technologies and tested
in web service environment with real time banking data. From the preliminary analysis of the result, we can see
that the extra time taken by web services after the implementation of this security concept is minimal and
acceptable.
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
DOI: 10.9790/0661-17353539 www.iosrjournals.org 37 | Page
Algorithm: WSDL_Attack_Prevention_At_Server_Side
Input: WSDL file
Variable: wsdl: WSDL file;
PriKSP: Private Key of Service Provider;
DSignSP: Digital Sign of SP; Digest: Hash of WSDL content;
SymK: Symmetric key; encWSDL: Encrypted WSDL file
Output: Encrypted WSDL
Begin
Step I: /* Service Provider sends WSDL to ISE */
wsdl = WSDL(SP)
Step II: /* Generates values for Keys and Hash; Assign to variables */
Call XKMS, KeyGen, Hash modules
Step III: /* Encrypt WSDL */
encWSDL = [wsdl + [Digest]PriKSP + DSignSP]SymK + Custom_Security_Elements
Step IV: /* Publish encWSDL */
Call UDDI Directory Service API
Service Registry  encWSDL
End
Figure 1: WSDL Attack Prevention (at Server Side)
Algorithm: WSDL_Attack_Prevention_At_Client_Side
Input: Encrypted WSDL file
Variable: wsdl: WSDL file; digest: Hash; SymK: Symmetric key; encWSDL: Encrypted WSDL file
Output: WSDL
Begin
Step I: /* Service Requester gets WSDL from Service Registry*/
Call UDDI Directory Service API;
Service Requester  ServiceRegistry[WSDL]
Step II: /* Check whether received WSDL is encrypted */
If Custom_Security_Elements found Then
encWSDL = Received WSDL
Else
Display “WSDL is not encrypted”;
End If
Step III: /* Get Symmetric Key from Service Provider using PKI and Decrypt WSDL */
wsdl = [encWSDL]SymK
Step IV: /* Calculate Digest of the decrypted WSDL & Compare it against received Digest */
If Calculated_Digest = Received_Digest Then
WSDL is not altered; Initiate binding process with Service Provider
Else
WSDL content is altered; Report to ISE;
End If
End
Figure 2: WSDL Attack Prevention (at Client Side)
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
DOI: 10.9790/0661-17353539 www.iosrjournals.org 38 | Page
Figure 3: Flow chart representation of the proposed security algorithm
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
DOI: 10.9790/0661-17353539 www.iosrjournals.org 39 | Page
IV. Conclusion
The earlier technologies for SOA such as RMI and CORBA are already sunset by the industry, and the
web services are preferred choice of enterprises for the implementation of SOA. The web services use XML as
data exchange format for its communication with service provider, service registry and service requester. As the
XML format is in a simple text, it is prone for attacks. From scanning the WSDL, an attacker can become to
know the list of available services along with their input/output parameters and their data types. It became
vulnerability for web service where the attackers can use these retrieved information in order to make attacks on
SOAP web services. A new security algorithm is proposed in this paper to protect the web services from the
WSDL attacks. As a novelty, this algorithm uses a specialized security component named “Intelligent Security
Engine” which can be configured to identify any kind of WSDL attacks. The proposed algorithm is
implemented and tested with real time data and results are as expected in terms of performance.
References
[1]. WSDL 2.0 Specifications: http://www.w3.org/TR/wsdl20/
[2]. WSDL 1.2 Specification: http://www.w3.org/TR/wsdl
[3]. Danish Jamil and Hassan Zaki, “Security Implication of SOAP and Web-Service Interface to the Cloud Computing System,”
International Journal of Engineering Science and Technology (IJEST), ISSN : 0975-5462 Vol. 3 No. 4, 2011
[4]. Mirtalebi, Arezoo, and Mohammad Reza Khayyambashi, “Enhancing Security of Web Service against WSDL Threats,” 2nd IEEE
International Conference on Emergency Management and Management Sciences (ICEMMS), pp. 920-923, IEEE, 2011.
[5]. Mirtalebi, Arezoo, and Mohammad Reza Khayyambashi, “A new Security Framework for Protecting WSDL File of Web Service,”
Internatinal Journal of Computer Science and Network Security (IJCSNS), Vol. 12, No. 9 , pp. 84-90, 2012.
[6]. Shahgholi, Narges, Mehran Mohsenzadeh, Mir Ali Seyyedi, and Saleh Hafez Qorani, “A New SOA Security Framework Defending
Web Services Against WSDL Attacks,” IEEE 3rd Inernational Conference on Privacy, Security, Risk and Trust (PASSAT), pp.
1259-1262, IEEE, 2011.
[7]. Shahgholi, Narges, Mehran Mohsenzadeh, Mir Ali Seyyedi, and Saleh Hafez Qorani, “A New Security Framework against Web
Services' XML attacks in SOA,” The 7th International Conference on Next Generation Web Services Practices, pp. 314-319, IEEE,
2011.
[8]. Singh Preeti, and Praveen Shende, “Symmetric Key Cryptography: Current Trends,” International Journal of Computer Science and
Mobile Computing, Vol. 3, Issue 12, pp. 410-415, 2014.
[9]. Chan, Dan TF, and Lucas CK Hui, “Towards a unified PKI Framework,” International Symposium on Technology Management
and Emerging Technologies (ISTMET), pp. 113-118. IEEE, 2014.
[10]. XML Key Management Specification: http://www.w3.org/TR/xkms2/
[11]. Cash, David, Rafael Dowsley, and Eike Kiltz, “Digital Signatures from Strong RSA without Prime Generation,” Public-Key
Cryptography (PKC 2015), pp. 217-235, Springer Berlin Heidelberg, 2015.

Más contenido relacionado

La actualidad más candente

iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
Designing a logical security framework
Designing a logical security frameworkDesigning a logical security framework
Designing a logical security frameworkijsc
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computingijcsa
 
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVEDEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVEcscpconf
 
IRJET- Highlighting Document Streams using Multi-Regional Input Output (MRIO)
IRJET- Highlighting Document Streams using Multi-Regional Input Output (MRIO)IRJET- Highlighting Document Streams using Multi-Regional Input Output (MRIO)
IRJET- Highlighting Document Streams using Multi-Regional Input Output (MRIO)IRJET Journal
 
Single Sign-On security issue in Cloud Computing
Single Sign-On security issue in Cloud ComputingSingle Sign-On security issue in Cloud Computing
Single Sign-On security issue in Cloud ComputingRahul Roshan
 
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...IJCERT JOURNAL
 
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO  PREVENT ATTACKS AGAINST...Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO  PREVENT ATTACKS AGAINST...
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...Telefónica
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd Iaetsd
 
76 s201923
76 s20192376 s201923
76 s201923IJRAT
 
Authentication Models
Authentication ModelsAuthentication Models
Authentication ModelsRaj Chanchal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
Introducing OpenID 1.0 Protocol: Security and Performance
Introducing OpenID 1.0 Protocol: Security and PerformanceIntroducing OpenID 1.0 Protocol: Security and Performance
Introducing OpenID 1.0 Protocol: Security and PerformanceAmin Saqi
 
IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODEIRJET Journal
 

La actualidad más candente (18)

iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
Designing a logical security framework
Designing a logical security frameworkDesigning a logical security framework
Designing a logical security framework
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computing
 
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVEDEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
 
Lecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLSLecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLS
 
IRJET- Highlighting Document Streams using Multi-Regional Input Output (MRIO)
IRJET- Highlighting Document Streams using Multi-Regional Input Output (MRIO)IRJET- Highlighting Document Streams using Multi-Regional Input Output (MRIO)
IRJET- Highlighting Document Streams using Multi-Regional Input Output (MRIO)
 
SOA Security
SOA Security SOA Security
SOA Security
 
Single Sign-On security issue in Cloud Computing
Single Sign-On security issue in Cloud ComputingSingle Sign-On security issue in Cloud Computing
Single Sign-On security issue in Cloud Computing
 
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
 
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO  PREVENT ATTACKS AGAINST...Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO  PREVENT ATTACKS AGAINST...
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured email
 
76 s201923
76 s20192376 s201923
76 s201923
 
Web services security_in_wse_3_ppt
Web services security_in_wse_3_pptWeb services security_in_wse_3_ppt
Web services security_in_wse_3_ppt
 
Authentication Models
Authentication ModelsAuthentication Models
Authentication Models
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Introducing OpenID 1.0 Protocol: Security and Performance
Introducing OpenID 1.0 Protocol: Security and PerformanceIntroducing OpenID 1.0 Protocol: Security and Performance
Introducing OpenID 1.0 Protocol: Security and Performance
 
Research paper
Research paperResearch paper
Research paper
 
IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODE
 

Similar a Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks

XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICESXML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICESijcsit
 
XML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesXML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesCSEIJJournal
 
XML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesXML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesAIRCC Publishing Corporation
 
A Survey on Authorization Systems for Web Applications
A Survey on Authorization Systems for Web ApplicationsA Survey on Authorization Systems for Web Applications
A Survey on Authorization Systems for Web Applicationsiosrjce
 
Web Based Secure Soa
Web Based Secure SoaWeb Based Secure Soa
Web Based Secure Soaijbuiiir1
 
Secure Architecture Evaluation for Agent Based Web Service Discovery
Secure Architecture Evaluation for Agent Based Web Service DiscoverySecure Architecture Evaluation for Agent Based Web Service Discovery
Secure Architecture Evaluation for Agent Based Web Service DiscoveryIDES Editor
 
Performance Evaluation of Web Services In Linux On Multicore
Performance Evaluation of Web Services In Linux On MulticorePerformance Evaluation of Web Services In Linux On Multicore
Performance Evaluation of Web Services In Linux On MulticoreCSCJournals
 
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENT
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENTA SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENT
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENTIJNSA Journal
 
Advantage of WCF Over Web Services
Advantage of WCF Over Web ServicesAdvantage of WCF Over Web Services
Advantage of WCF Over Web ServicesSiva Tharun Kola
 
Designing A Logical Security Framework for E-Commerce System Based on SOA
Designing A Logical Security Framework for E-Commerce System Based on SOA  Designing A Logical Security Framework for E-Commerce System Based on SOA
Designing A Logical Security Framework for E-Commerce System Based on SOA ijsc
 
Web services and SOA [Modified]
Web services and SOA [Modified]Web services and SOA [Modified]
Web services and SOA [Modified]Subin Sugunan
 
SOA Security Model For EAI
SOA Security Model For EAISOA Security Model For EAI
SOA Security Model For EAIvivekjv
 
A Study Of Web Services And Its Implications
A Study Of Web Services And Its ImplicationsA Study Of Web Services And Its Implications
A Study Of Web Services And Its ImplicationsTony Lisko
 

Similar a Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks (20)

W4502140150
W4502140150W4502140150
W4502140150
 
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICESXML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
 
XML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesXML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web Services
 
XML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesXML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web Services
 
Web Services Security - Short Report
Web Services Security - Short ReportWeb Services Security - Short Report
Web Services Security - Short Report
 
Presentation1REVIEW
Presentation1REVIEWPresentation1REVIEW
Presentation1REVIEW
 
A Survey on Authorization Systems for Web Applications
A Survey on Authorization Systems for Web ApplicationsA Survey on Authorization Systems for Web Applications
A Survey on Authorization Systems for Web Applications
 
A017310105
A017310105A017310105
A017310105
 
Web Based Secure Soa
Web Based Secure SoaWeb Based Secure Soa
Web Based Secure Soa
 
Secure Architecture Evaluation for Agent Based Web Service Discovery
Secure Architecture Evaluation for Agent Based Web Service DiscoverySecure Architecture Evaluation for Agent Based Web Service Discovery
Secure Architecture Evaluation for Agent Based Web Service Discovery
 
Performance Evaluation of Web Services In Linux On Multicore
Performance Evaluation of Web Services In Linux On MulticorePerformance Evaluation of Web Services In Linux On Multicore
Performance Evaluation of Web Services In Linux On Multicore
 
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENT
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENTA SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENT
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENT
 
Saas security
Saas securitySaas security
Saas security
 
Advantage of WCF Over Web Services
Advantage of WCF Over Web ServicesAdvantage of WCF Over Web Services
Advantage of WCF Over Web Services
 
Cc unit 2 updated
Cc unit 2 updatedCc unit 2 updated
Cc unit 2 updated
 
Designing A Logical Security Framework for E-Commerce System Based on SOA
Designing A Logical Security Framework for E-Commerce System Based on SOA  Designing A Logical Security Framework for E-Commerce System Based on SOA
Designing A Logical Security Framework for E-Commerce System Based on SOA
 
Web services and SOA [Modified]
Web services and SOA [Modified]Web services and SOA [Modified]
Web services and SOA [Modified]
 
SOA Security Model For EAI
SOA Security Model For EAISOA Security Model For EAI
SOA Security Model For EAI
 
Overview of web services
Overview of web servicesOverview of web services
Overview of web services
 
A Study Of Web Services And Its Implications
A Study Of Web Services And Its ImplicationsA Study Of Web Services And Its Implications
A Study Of Web Services And Its Implications
 

Más de iosrjce

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...iosrjce
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later lifeiosrjce
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...iosrjce
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubaiiosrjce
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...iosrjce
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approachiosrjce
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sitesiosrjce
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeiosrjce
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...iosrjce
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...iosrjce
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladeshiosrjce
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...iosrjce
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...iosrjce
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Considerationiosrjce
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyiosrjce
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...iosrjce
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...iosrjce
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...iosrjce
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...iosrjce
 

Más de iosrjce (20)

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later life
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubai
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sites
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperative
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Consideration
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative study
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
 

Último

(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Último (20)

(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 

Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. V (May – Jun. 2015), PP 35-39 www.iosrjournals.org DOI: 10.9790/0661-17353539 www.iosrjournals.org 35 | Page Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks Mohamed Ibrahim B1 , Mohamed Shanavas A R2 1 Software Solution Architect & Research Scholar 2 Associate Professor, Jamal Mohamed College, Tiruchirappalli, India Abstract: The Web Services are the emerging paradigm of Service Oriented Architecture (SOA) in the modern enterprise computing to achieve interconnection of related applications in an organization in terms of services. A service is a Software component which fulfills a defined functionality and does not depend on the context of other services. In programming terms, the service is called as web method which is a function that accepts input parameters and returns the output. The data types of input/output parameters may be simple or complex. In SOA architecture, the list of web methods that a web service offers and the data types of their input/output parameters are described using Web Services Description Language (WSDL) standard and published to Universal Description, Discovery and Integration (UDDI) service registry where the web services clients search the service registry for obtaining the required WSDL and start binding to the web server. The WSDL is prone for SOA attacks as the WSDL is represented in XML format which is a plain text. Even though few researchers proposed solutions for WSDL, those solutions are inadequate concerning to the modern communication technologies and they are not able to achieve any landmark in providing security for WSDL attacks. This paper proposes a new algorithm for preventing WSDL attacks which uses the existing security standards such as Public Key Infrastructure (PKI), Digital Signatures, and XML Encryption/Decryption standards. Keywords - SOA, Web Services, Security, WSDL, PKI, Computer Networks I. Introduction In order to integrate the related applications in an enterprise, several standards such as RMI, CORBA and DCOM are used earlier. These standards adhere to the Service Oriented Architecture (SOA) where a service is a component in an application which fulfills the defined functionality where it does not depend on the context of other services. However, these standards belong to specific vendors and depend on the languages, platforms and machine architectures. The Web Services are the emerging model in SOA which uses standard Internet protocols for communication between web server and its clients. The Internet protocols are supported by majority of machine architectures and platforms and the web services use simple XML format for data exchange. As all the modern programming languages are comfortable to parsing XML formats, web services can be developed and maintained in any language, thus provides language independent. The list of available services, their input/output parameters and data types are described using Web Services Description Language (WSDL). The WSDL is a standard recommended by World Wide Web Consortium (W3C). The latest version of WSDL is 2.0 [1] and its previous standard version is 1.2 [2], where the structures of both versions are different. The web service descriptions are published in Service Registry using Universal Description, Discovery and Integration (UDDI) standard where the web service clients will look into this registry for the required service description and start communicating with service provider. Thus the standard SOA architecture contains three important components: (i) Service Provider, (ii) Service Registry and (iii) Client. The three different basic operations that can be performed in SOA architecture are: (i) Publish by Service Provider to Service Registry, (ii) Find by Client from Service Registry and (iii) Bind by Client to Service Provider [3]. In this paper, we concentrate on providing security for “publish” and “find” part of SOA architecture, i.e. protecting WSDL operations in order to prevent attackers to attack web services by gaining advantage of interpreting WSDL content which is in plain text format. This paper is organized as: Section 2 reviews the available literature for WSDL attack prevention, the proposed algorithm for protecting SOAP web services from WSDL attacks is explained along with proof-of- concept and result analysis in Section 3, and Section 4 concludes the paper. II. Literature Review Reviewing literature, we can see many researchers shown interest in protecting message level attacks, which may occur during web service request and response between web service client and web service provider. Only very less researchers are provided solutions for WSDL attacks. In fact, the WSDL attacks are severe which
  • 2. Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks DOI: 10.9790/0661-17353539 www.iosrjournals.org 36 | Page may halt the entire web services down and provides opportunity for attackers to retrieve sensitive information of the organization. Mirtalebi et al. [4, 5] and Narges et al. [6, 7] proposed security solutions in the form of framework for defending WSDL attacks. Both the researchers use the symmetric key cryptography for securing the WSDL content before publishing it to service registry. However the key maintenance methods and key exchange mechanisms in order to receive the symmetric from the service provider are not clearly defined in their papers. The security solutions that are provided by vendors only work as part of their products and they have few implementation constraints. At present, there is no comprehensive security solution defined for preventing WSDL attacks. III. Proposed Algorithm for Preventing WSDL attacks The proposed algorithm uses the XML encryption standard to protect the WSDL scanning attacks on the SOAP based web services. It does not aim to encrypt the entire WSDL which is represented XML format, but only the critical portion through which the attacks can interpret the important information of the defined services such as the exposed service names along with their input/output parameters. The custom security elements are added with WSDL segment in order to notify the clients the retrieved WSDL from the service registry is encrypted and the clients are needed to descript before they bind to the web server. The security algorithm use symmetric key cryptography for encrypting the content of the WSDL and asymmetric key cryptography for validating service provider/service requester of web service. The hashing algorithm such as MD5/SH-1 is applied to ensure the message integrity of the WSDL content transmission. It is assumed that the service provider and requester trust on the same Certificate Authority (CA) in order to create and validate digital signatures. To maintain the digital certificates, the existing PKI and XMKS standards are used. The proposed algorithm uses the existing security standards as stated below.  Symmetric Key Cryptography for encrypting the WSDL content at Service Provider [8].  Hashing Algorithm for generating digest for ensuring message integrity to check whether the received message at the web service client is not altered by the intermediate nodes passed through from service registry.  Public Key Infrastructure (PKI) and XML Key Management System (XKMS) are used for maintaining private/public keys of using asymmetric key cryptography. Private Key is used for encryption and Public Key is used for decryption, and vice versa [9, 10]  Digital Signatures for ensuring the request/response is from right resource [11].  Certificate Authority (CA) for maintaining digital certificates used for digital signatures.  A new Software component named “Intelligent Security Engine (ISE)” is introduced at Service Provider end which is the implementation of the proposed security algorithm at server side.  The ISE can be placed in a proxy server so that it can serve for many web servers in which different web services are running. Even it can be attached to Enterprise Service Bus (ESB) network, through which security can be applied to the entire Enterprise Application Integration (EAI) components. The proposed security algorithm for protecting SOAP web services from WSDL attacks are given in Figure 1 and Figure 2 respectively for service provider and service requester side. The flow chart representation of the proposed algorithm is outlined in Figure 3. As proof-of-concept (POC), the proposed algorithm is implemented using Java technologies and tested in web service environment with real time banking data. From the preliminary analysis of the result, we can see that the extra time taken by web services after the implementation of this security concept is minimal and acceptable.
  • 3. Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks DOI: 10.9790/0661-17353539 www.iosrjournals.org 37 | Page Algorithm: WSDL_Attack_Prevention_At_Server_Side Input: WSDL file Variable: wsdl: WSDL file; PriKSP: Private Key of Service Provider; DSignSP: Digital Sign of SP; Digest: Hash of WSDL content; SymK: Symmetric key; encWSDL: Encrypted WSDL file Output: Encrypted WSDL Begin Step I: /* Service Provider sends WSDL to ISE */ wsdl = WSDL(SP) Step II: /* Generates values for Keys and Hash; Assign to variables */ Call XKMS, KeyGen, Hash modules Step III: /* Encrypt WSDL */ encWSDL = [wsdl + [Digest]PriKSP + DSignSP]SymK + Custom_Security_Elements Step IV: /* Publish encWSDL */ Call UDDI Directory Service API Service Registry  encWSDL End Figure 1: WSDL Attack Prevention (at Server Side) Algorithm: WSDL_Attack_Prevention_At_Client_Side Input: Encrypted WSDL file Variable: wsdl: WSDL file; digest: Hash; SymK: Symmetric key; encWSDL: Encrypted WSDL file Output: WSDL Begin Step I: /* Service Requester gets WSDL from Service Registry*/ Call UDDI Directory Service API; Service Requester  ServiceRegistry[WSDL] Step II: /* Check whether received WSDL is encrypted */ If Custom_Security_Elements found Then encWSDL = Received WSDL Else Display “WSDL is not encrypted”; End If Step III: /* Get Symmetric Key from Service Provider using PKI and Decrypt WSDL */ wsdl = [encWSDL]SymK Step IV: /* Calculate Digest of the decrypted WSDL & Compare it against received Digest */ If Calculated_Digest = Received_Digest Then WSDL is not altered; Initiate binding process with Service Provider Else WSDL content is altered; Report to ISE; End If End Figure 2: WSDL Attack Prevention (at Client Side)
  • 4. Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks DOI: 10.9790/0661-17353539 www.iosrjournals.org 38 | Page Figure 3: Flow chart representation of the proposed security algorithm
  • 5. Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks DOI: 10.9790/0661-17353539 www.iosrjournals.org 39 | Page IV. Conclusion The earlier technologies for SOA such as RMI and CORBA are already sunset by the industry, and the web services are preferred choice of enterprises for the implementation of SOA. The web services use XML as data exchange format for its communication with service provider, service registry and service requester. As the XML format is in a simple text, it is prone for attacks. From scanning the WSDL, an attacker can become to know the list of available services along with their input/output parameters and their data types. It became vulnerability for web service where the attackers can use these retrieved information in order to make attacks on SOAP web services. A new security algorithm is proposed in this paper to protect the web services from the WSDL attacks. As a novelty, this algorithm uses a specialized security component named “Intelligent Security Engine” which can be configured to identify any kind of WSDL attacks. The proposed algorithm is implemented and tested with real time data and results are as expected in terms of performance. References [1]. WSDL 2.0 Specifications: http://www.w3.org/TR/wsdl20/ [2]. WSDL 1.2 Specification: http://www.w3.org/TR/wsdl [3]. Danish Jamil and Hassan Zaki, “Security Implication of SOAP and Web-Service Interface to the Cloud Computing System,” International Journal of Engineering Science and Technology (IJEST), ISSN : 0975-5462 Vol. 3 No. 4, 2011 [4]. Mirtalebi, Arezoo, and Mohammad Reza Khayyambashi, “Enhancing Security of Web Service against WSDL Threats,” 2nd IEEE International Conference on Emergency Management and Management Sciences (ICEMMS), pp. 920-923, IEEE, 2011. [5]. Mirtalebi, Arezoo, and Mohammad Reza Khayyambashi, “A new Security Framework for Protecting WSDL File of Web Service,” Internatinal Journal of Computer Science and Network Security (IJCSNS), Vol. 12, No. 9 , pp. 84-90, 2012. [6]. Shahgholi, Narges, Mehran Mohsenzadeh, Mir Ali Seyyedi, and Saleh Hafez Qorani, “A New SOA Security Framework Defending Web Services Against WSDL Attacks,” IEEE 3rd Inernational Conference on Privacy, Security, Risk and Trust (PASSAT), pp. 1259-1262, IEEE, 2011. [7]. Shahgholi, Narges, Mehran Mohsenzadeh, Mir Ali Seyyedi, and Saleh Hafez Qorani, “A New Security Framework against Web Services' XML attacks in SOA,” The 7th International Conference on Next Generation Web Services Practices, pp. 314-319, IEEE, 2011. [8]. Singh Preeti, and Praveen Shende, “Symmetric Key Cryptography: Current Trends,” International Journal of Computer Science and Mobile Computing, Vol. 3, Issue 12, pp. 410-415, 2014. [9]. Chan, Dan TF, and Lucas CK Hui, “Towards a unified PKI Framework,” International Symposium on Technology Management and Emerging Technologies (ISTMET), pp. 113-118. IEEE, 2014. [10]. XML Key Management Specification: http://www.w3.org/TR/xkms2/ [11]. Cash, David, Rafael Dowsley, and Eike Kiltz, “Digital Signatures from Strong RSA without Prime Generation,” Public-Key Cryptography (PKC 2015), pp. 217-235, Springer Berlin Heidelberg, 2015.