SlideShare a Scribd company logo
1 of 26
BY
E.M.Roopa Devi
Kongu Engineering College
 It includes the description information about a
Web service necessary to construct a message
body and message headers so that a service
requester can invoke a service.
 The provider of the service publishes the
metadata
 Requester can discover it and use it to construct
messages that can be successfully processed by
the provider.
Metadata specifications include:
 XML Schema
 WSDL
 WS-Addressing
 WS-Policy
 WS-Metadata Exchange
 It’s possible that a requester will obtain the
metadata it needs using WS-Metadata Exchange
or another similar mechanism that queries the
WSDL and associated policy files directly
 WS-MetadataExchange uses a feature of WS-
Addressing called “actions” to access the
metadata published by a service provider.
 XML based security technologies are also often
important for protecting the XML data before and
after it’s included in a SOAP message.
 These technologies include:
1. XML Signature
2. XML Encryption
 It is designed to provide integrity, using a
variety of encryption and signature
mechanisms.
 It is used to ensure that service providers can
determine whether or not documents have
been altered in transit and that they are
received once and only once.
 Designed to provide confidentiality, using a
variety of supported encryption algorithms, of
part or all of an XML document to ensure that
the contents of a document cannot be
intercepted and read by unauthorized persons.
 XML Encryption and XML Signature can be
used to protect Web services metadata as well
as data.
 SAML-Security Assertion Markup Language
 SAML can be used on its own for exchanging
authorization information.
 It is an XML-based open-standard for
transferring identity data between two parties:
 an identity provider (IdP) — Performs
authentication and passes the user's identity and
authorization level to the service provider.
 a service provider (SP) — Trusts the identity
provider and authorizes the given user to access the
requested resource
 XACML stands for "eXtensible Access Control
Markup Language”
 It is an XML-based language for access control
that has been standardized by the Technical
Committee of the OASIS consortium.
 It describes both an access control policy
language, request/response language and
reference architecture.
 XKMS stands for XML Key Management
Specification
 It is a specification of XML application/protocol
that allows a simple client to obtain key
information (values, certificates, and
management or trust data) from a Web Service.
 Security concerns apply at every level of the Web
services specification stack and require a variety
of mechanisms to guard against the numerous
challenges and threats that are a part of
distributed computing.
 The mechanisms may have to be used in
combination to guard against a particular threat
or combination of threats.
 WS-Security is designed as a kind of open
framework that can carry any token type.
 It was developed to provide message-level
security on an end-to-end basis for Web services
messages.
 WS-Security headers include the ability to carry
strong authentication formats such as Kerberos
tickets and X.509 certificates and can use XML
Encryption and XML Signature technologies for
further protecting the message contents.
 Additional specifications from IBM, Microsoft,
Verisign, and others further extend and
complement WS-Security, including:
1. WS-SecurityPolicy
2. WS-Trust
3. WS-SecureConversation
4. WS-Federation
 WS-SecurityPolicy—Defines security
assertions detailing a Web service’s
requirements so that the service requester can
meet them.
 WS-Trust—Defines how to establish overall
trust of the security system by acquiring any
needed security tokens (such as Kerberos
tickets) from trusted sources.
 WS-SecureConversation—Defines how to
establish and maintain a persistent context for
a secure session over which multiple Web
service invocations might be sent without
requiring expensive authentication each time.
 WS-Federation—Defines how to bridge
multiple security domains into a federated
session so that a Web service only has to be
authenticated once to access Web services
deployed in multiple security domains.
 Messaging includes SOAP and its various
message exchange patterns (MEP).
 Reliable messaging is the mechanism that
guarantees that one or more messages were
received the appropriate number of times.
 Reliable messaging specifications include:
 WS-Reliability
 WS-Reliable Messaging (from IBM and Microsoft)
 Reliable messaging is a protocol for exchanging
SOAP messages with guaranteed delivery, no
duplicates, and guaranteed message ordering
 It also supports the concept of bridging two
proprietary messaging protocols over the
Internet
 It automates recovery from certain transport-
level error conditions that the application
would otherwise have to deal with on its own.
 Transactions allow multiple operations, usually
on persistent data, to succeed or fail as a unit,
such as processing an order or transferring
funds.
 One of the most important aspects of
transaction processing technologies is their
ability to recover an application to a known
state following an operating system or hard-
ware failure.
 For example, if any failure occurs before a
funds transfer operation is completed (that is,
both the debit and credit operations),
transactions ensure the bank account balances
are what they were before the funds transfer
operation started.
 Web services transaction specifications extend
the concept of the transaction coordinator
 adapt the familiar two-phase commit protocol for
Web services
 define new extended transaction protocols for more
loosely coupled Web services and orchestration flows
 Transaction coordinators currently exist in most
execution environments, including J2EE, the
.NET Framework, and CORBA
 Web services specifications define extensions
for coordinators for compensation-based
protocols and long-running coordinator-
coordinator protocols that bridge software
domains.
 It is a general mechanism for determining a
consistent, predefined outcome for composite
Web service applications.
 The coordinator model includes two major
phases:
 acquisition phase
 second phase
 Acquisition phase - Web services that are
participating in the composite are enrolled with
the coordinator for a specific protocol (such as
two-phase commit, compensation, or business
process)
 Second phase in which the coordinator drives
the agreed-upon protocol to completion
following the end of the execution of the set of
services in the composite.
 When a failure occurs, the coordinator is
responsible for driving the recovery protocol
 WS-Transactions family from BEA, IBM, and
Microsoft:
 WS-Atomic Transactions
 WS-Business Activity
 WS-Coordination
 WS-Composite Application Framework (WS-
CAF) from OASIS:
 WS-Context
 WS-Coordination Framework
 WS-Transaction Management
 Integrating mobile devices into an SOA presents
specific challenges because the mobile devices may
not always be connected to a network.
 Mobile devices may also move through network
connectivity zones, picking up new IP addresses
when they reconnect.
 “Mobilized” software is emerging to integrate
mobile devices quickly and easily into the service-
oriented enterprise.
Occasionally connected architecture for mobile
devices
 The SOAP messages in a mobile software
solution are transported from the mobile client
to the server using a store-and-forward
asynchronous protocol that allows the mobile
client to keep working even when a network
connection isn’t available
 When the connection is available, transactions
flow to the server-side SOA-based application
directly using the messaging transport
 When a connection isn’t available, transactions
are stored locally so that they can be
transmitted when a connection becomes
available

More Related Content

What's hot

SOA Fundamentals
SOA  FundamentalsSOA  Fundamentals
SOA Fundamentalsabhi1112
 
Service-oriented Architecture with Respect to Reusability
Service-oriented Architecture with Respect to ReusabilityService-oriented Architecture with Respect to Reusability
Service-oriented Architecture with Respect to ReusabilityYazd University
 
Web Services-Enhanced Agile Modeling and Integrating Business Processes
Web Services-Enhanced Agile Modeling and Integrating Business ProcessesWeb Services-Enhanced Agile Modeling and Integrating Business Processes
Web Services-Enhanced Agile Modeling and Integrating Business ProcessesMustafa Salam
 
Service oriented architecture
Service oriented  architectureService oriented  architecture
Service oriented architecturePratik Patil
 
The New Enterprise Alphabet - .Net, XML And XBRL
The New Enterprise Alphabet - .Net, XML And XBRLThe New Enterprise Alphabet - .Net, XML And XBRL
The New Enterprise Alphabet - .Net, XML And XBRLJorgen Thelin
 
Service Oriented Architecture
Service Oriented ArchitectureService Oriented Architecture
Service Oriented ArchitectureAndriy Buday
 
SOA Reference Architecture
SOA Reference ArchitectureSOA Reference Architecture
SOA Reference ArchitectureRajan Ramanujam
 
CBSE VS SOA SJSU Presentation
CBSE VS SOA SJSU PresentationCBSE VS SOA SJSU Presentation
CBSE VS SOA SJSU Presentationmgp1560
 
SOA - Service Oriented Architecture ( Basic Concept & Principle )
SOA - Service Oriented Architecture ( Basic Concept & Principle )SOA - Service Oriented Architecture ( Basic Concept & Principle )
SOA - Service Oriented Architecture ( Basic Concept & Principle )DevTalk
 
Topic3 Enterprise Application Integration
Topic3 Enterprise Application IntegrationTopic3 Enterprise Application Integration
Topic3 Enterprise Application Integrationsanjoysanyal
 
SOA Service Oriented Architecture
SOA Service Oriented ArchitectureSOA Service Oriented Architecture
SOA Service Oriented ArchitectureVinay Rajadhyaksha
 
Can IBM i play with SOA?
Can IBM i play with SOA?Can IBM i play with SOA?
Can IBM i play with SOA?LANSA
 
Service oriented architecture characteristics of soa
Service oriented architecture characteristics  of soaService oriented architecture characteristics  of soa
Service oriented architecture characteristics of soasmithaps4
 
Introduction to business process execution language
Introduction to business process execution languageIntroduction to business process execution language
Introduction to business process execution languagesuranisaunak
 

What's hot (20)

SOA Fundamentals
SOA  FundamentalsSOA  Fundamentals
SOA Fundamentals
 
Service-oriented Architecture with Respect to Reusability
Service-oriented Architecture with Respect to ReusabilityService-oriented Architecture with Respect to Reusability
Service-oriented Architecture with Respect to Reusability
 
Web Services-Enhanced Agile Modeling and Integrating Business Processes
Web Services-Enhanced Agile Modeling and Integrating Business ProcessesWeb Services-Enhanced Agile Modeling and Integrating Business Processes
Web Services-Enhanced Agile Modeling and Integrating Business Processes
 
Service oriented architecture
Service oriented  architectureService oriented  architecture
Service oriented architecture
 
The New Enterprise Alphabet - .Net, XML And XBRL
The New Enterprise Alphabet - .Net, XML And XBRLThe New Enterprise Alphabet - .Net, XML And XBRL
The New Enterprise Alphabet - .Net, XML And XBRL
 
Service Oriented Architecture
Service Oriented ArchitectureService Oriented Architecture
Service Oriented Architecture
 
SOA Reference Architecture
SOA Reference ArchitectureSOA Reference Architecture
SOA Reference Architecture
 
Migration and Security in SOA | Torry Harris Whitepaper
Migration and Security in SOA | Torry Harris WhitepaperMigration and Security in SOA | Torry Harris Whitepaper
Migration and Security in SOA | Torry Harris Whitepaper
 
CBSE VS SOA SJSU Presentation
CBSE VS SOA SJSU PresentationCBSE VS SOA SJSU Presentation
CBSE VS SOA SJSU Presentation
 
SOA - Service Oriented Architecture ( Basic Concept & Principle )
SOA - Service Oriented Architecture ( Basic Concept & Principle )SOA - Service Oriented Architecture ( Basic Concept & Principle )
SOA - Service Oriented Architecture ( Basic Concept & Principle )
 
Soa chapter 5
Soa chapter 5Soa chapter 5
Soa chapter 5
 
Topic3 Enterprise Application Integration
Topic3 Enterprise Application IntegrationTopic3 Enterprise Application Integration
Topic3 Enterprise Application Integration
 
SOA Service Oriented Architecture
SOA Service Oriented ArchitectureSOA Service Oriented Architecture
SOA Service Oriented Architecture
 
SOA Principles : 6. service composibility
SOA Principles : 6. service composibilitySOA Principles : 6. service composibility
SOA Principles : 6. service composibility
 
Can IBM i play with SOA?
Can IBM i play with SOA?Can IBM i play with SOA?
Can IBM i play with SOA?
 
SOA Princples : 7. service autonomy
SOA Princples : 7. service autonomySOA Princples : 7. service autonomy
SOA Princples : 7. service autonomy
 
1. soa design pattern introduction
1. soa design pattern introduction1. soa design pattern introduction
1. soa design pattern introduction
 
What is service
What is serviceWhat is service
What is service
 
Service oriented architecture characteristics of soa
Service oriented architecture characteristics  of soaService oriented architecture characteristics  of soa
Service oriented architecture characteristics of soa
 
Introduction to business process execution language
Introduction to business process execution languageIntroduction to business process execution language
Introduction to business process execution language
 

Similar to Uunit 5-xml&web security

Service Oriented Development With Windows Communication Foundation Tulsa Dnug
Service Oriented Development With Windows Communication Foundation   Tulsa DnugService Oriented Development With Windows Communication Foundation   Tulsa Dnug
Service Oriented Development With Windows Communication Foundation Tulsa DnugJason Townsend, MBA
 
Tulsa Tech Fest2008 Service Oriented Development With Windows Communication F...
Tulsa Tech Fest2008 Service Oriented Development With Windows Communication F...Tulsa Tech Fest2008 Service Oriented Development With Windows Communication F...
Tulsa Tech Fest2008 Service Oriented Development With Windows Communication F...Jason Townsend, MBA
 
Service Oriented Development With Windows Communication Foundation 2003
Service Oriented Development With Windows Communication Foundation 2003Service Oriented Development With Windows Communication Foundation 2003
Service Oriented Development With Windows Communication Foundation 2003Jason Townsend, MBA
 
What is Advanced Web Servicels.pdf
What is Advanced Web Servicels.pdfWhat is Advanced Web Servicels.pdf
What is Advanced Web Servicels.pdfAngelicaPantaleon3
 
Advantage of WCF Over Web Services
Advantage of WCF Over Web ServicesAdvantage of WCF Over Web Services
Advantage of WCF Over Web ServicesSiva Tharun Kola
 
Designing A Logical Security Framework for E-Commerce System Based on SOA
Designing A Logical Security Framework for E-Commerce System Based on SOA  Designing A Logical Security Framework for E-Commerce System Based on SOA
Designing A Logical Security Framework for E-Commerce System Based on SOA ijsc
 
Designing a logical security framework
Designing a logical security frameworkDesigning a logical security framework
Designing a logical security frameworkijsc
 
Enterprise Software Architecture
Enterprise Software ArchitectureEnterprise Software Architecture
Enterprise Software Architecturerahmed_sct
 
Web Api services using IBM Datapower
Web Api services using IBM DatapowerWeb Api services using IBM Datapower
Web Api services using IBM DatapowerSigortam.net
 
Overview of Windows Vista Devices and Windows Communication Foundation (WCF)
Overview of Windows Vista Devices and Windows Communication Foundation (WCF)Overview of Windows Vista Devices and Windows Communication Foundation (WCF)
Overview of Windows Vista Devices and Windows Communication Foundation (WCF)Jorgen Thelin
 
Soa Testing An Approach For Testing Security Aspects Of Soa Based Application
Soa Testing   An Approach For Testing Security Aspects Of Soa Based ApplicationSoa Testing   An Approach For Testing Security Aspects Of Soa Based Application
Soa Testing An Approach For Testing Security Aspects Of Soa Based ApplicationJaipal Naidu
 
A Survey on Authorization Systems for Web Applications
A Survey on Authorization Systems for Web ApplicationsA Survey on Authorization Systems for Web Applications
A Survey on Authorization Systems for Web Applicationsiosrjce
 
Understanding Web Services by software outsourcing company india
Understanding Web Services by software outsourcing company indiaUnderstanding Web Services by software outsourcing company india
Understanding Web Services by software outsourcing company indiaJignesh Aakoliya
 
Mule securing
Mule   securingMule   securing
Mule securingSindhu VL
 

Similar to Uunit 5-xml&web security (20)

Web Service Extensions | Torry Harris Whitepaper
Web Service Extensions | Torry Harris WhitepaperWeb Service Extensions | Torry Harris Whitepaper
Web Service Extensions | Torry Harris Whitepaper
 
Service Oriented Development With Windows Communication Foundation Tulsa Dnug
Service Oriented Development With Windows Communication Foundation   Tulsa DnugService Oriented Development With Windows Communication Foundation   Tulsa Dnug
Service Oriented Development With Windows Communication Foundation Tulsa Dnug
 
Tulsa Tech Fest2008 Service Oriented Development With Windows Communication F...
Tulsa Tech Fest2008 Service Oriented Development With Windows Communication F...Tulsa Tech Fest2008 Service Oriented Development With Windows Communication F...
Tulsa Tech Fest2008 Service Oriented Development With Windows Communication F...
 
W4502140150
W4502140150W4502140150
W4502140150
 
Service Oriented Development With Windows Communication Foundation 2003
Service Oriented Development With Windows Communication Foundation 2003Service Oriented Development With Windows Communication Foundation 2003
Service Oriented Development With Windows Communication Foundation 2003
 
WCF
WCFWCF
WCF
 
What is Advanced Web Servicels.pdf
What is Advanced Web Servicels.pdfWhat is Advanced Web Servicels.pdf
What is Advanced Web Servicels.pdf
 
Advantage of WCF Over Web Services
Advantage of WCF Over Web ServicesAdvantage of WCF Over Web Services
Advantage of WCF Over Web Services
 
Designing A Logical Security Framework for E-Commerce System Based on SOA
Designing A Logical Security Framework for E-Commerce System Based on SOA  Designing A Logical Security Framework for E-Commerce System Based on SOA
Designing A Logical Security Framework for E-Commerce System Based on SOA
 
Designing a logical security framework
Designing a logical security frameworkDesigning a logical security framework
Designing a logical security framework
 
integeration
integerationintegeration
integeration
 
Enterprise Software Architecture
Enterprise Software ArchitectureEnterprise Software Architecture
Enterprise Software Architecture
 
Web Api services using IBM Datapower
Web Api services using IBM DatapowerWeb Api services using IBM Datapower
Web Api services using IBM Datapower
 
Web Services Security - Short Report
Web Services Security - Short ReportWeb Services Security - Short Report
Web Services Security - Short Report
 
Overview of Windows Vista Devices and Windows Communication Foundation (WCF)
Overview of Windows Vista Devices and Windows Communication Foundation (WCF)Overview of Windows Vista Devices and Windows Communication Foundation (WCF)
Overview of Windows Vista Devices and Windows Communication Foundation (WCF)
 
Soa Testing An Approach For Testing Security Aspects Of Soa Based Application
Soa Testing   An Approach For Testing Security Aspects Of Soa Based ApplicationSoa Testing   An Approach For Testing Security Aspects Of Soa Based Application
Soa Testing An Approach For Testing Security Aspects Of Soa Based Application
 
A Survey on Authorization Systems for Web Applications
A Survey on Authorization Systems for Web ApplicationsA Survey on Authorization Systems for Web Applications
A Survey on Authorization Systems for Web Applications
 
A017310105
A017310105A017310105
A017310105
 
Understanding Web Services by software outsourcing company india
Understanding Web Services by software outsourcing company indiaUnderstanding Web Services by software outsourcing company india
Understanding Web Services by software outsourcing company india
 
Mule securing
Mule   securingMule   securing
Mule securing
 

More from ssuser3a47cb

More from ssuser3a47cb (7)

BCT.pptx
BCT.pptxBCT.pptx
BCT.pptx
 
Soa 1 7.ppsx
Soa 1 7.ppsxSoa 1 7.ppsx
Soa 1 7.ppsx
 
Java swing
Java swingJava swing
Java swing
 
Java networking
Java networkingJava networking
Java networking
 
I/O port programming in 8051
I/O port programming in 8051I/O port programming in 8051
I/O port programming in 8051
 
Interfacing external memory in 8051
Interfacing external memory in 8051Interfacing external memory in 8051
Interfacing external memory in 8051
 
Interrupt in 8051
Interrupt in 8051Interrupt in 8051
Interrupt in 8051
 

Recently uploaded

Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 

Recently uploaded (20)

Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 

Uunit 5-xml&web security

  • 2.  It includes the description information about a Web service necessary to construct a message body and message headers so that a service requester can invoke a service.  The provider of the service publishes the metadata  Requester can discover it and use it to construct messages that can be successfully processed by the provider.
  • 3. Metadata specifications include:  XML Schema  WSDL  WS-Addressing  WS-Policy  WS-Metadata Exchange
  • 4.  It’s possible that a requester will obtain the metadata it needs using WS-Metadata Exchange or another similar mechanism that queries the WSDL and associated policy files directly  WS-MetadataExchange uses a feature of WS- Addressing called “actions” to access the metadata published by a service provider.
  • 5.  XML based security technologies are also often important for protecting the XML data before and after it’s included in a SOAP message.  These technologies include: 1. XML Signature 2. XML Encryption
  • 6.  It is designed to provide integrity, using a variety of encryption and signature mechanisms.  It is used to ensure that service providers can determine whether or not documents have been altered in transit and that they are received once and only once.
  • 7.  Designed to provide confidentiality, using a variety of supported encryption algorithms, of part or all of an XML document to ensure that the contents of a document cannot be intercepted and read by unauthorized persons.  XML Encryption and XML Signature can be used to protect Web services metadata as well as data.
  • 8.  SAML-Security Assertion Markup Language  SAML can be used on its own for exchanging authorization information.  It is an XML-based open-standard for transferring identity data between two parties:  an identity provider (IdP) — Performs authentication and passes the user's identity and authorization level to the service provider.  a service provider (SP) — Trusts the identity provider and authorizes the given user to access the requested resource
  • 9.  XACML stands for "eXtensible Access Control Markup Language”  It is an XML-based language for access control that has been standardized by the Technical Committee of the OASIS consortium.  It describes both an access control policy language, request/response language and reference architecture.
  • 10.  XKMS stands for XML Key Management Specification  It is a specification of XML application/protocol that allows a simple client to obtain key information (values, certificates, and management or trust data) from a Web Service.
  • 11.  Security concerns apply at every level of the Web services specification stack and require a variety of mechanisms to guard against the numerous challenges and threats that are a part of distributed computing.  The mechanisms may have to be used in combination to guard against a particular threat or combination of threats.
  • 12.  WS-Security is designed as a kind of open framework that can carry any token type.  It was developed to provide message-level security on an end-to-end basis for Web services messages.  WS-Security headers include the ability to carry strong authentication formats such as Kerberos tickets and X.509 certificates and can use XML Encryption and XML Signature technologies for further protecting the message contents.
  • 13.  Additional specifications from IBM, Microsoft, Verisign, and others further extend and complement WS-Security, including: 1. WS-SecurityPolicy 2. WS-Trust 3. WS-SecureConversation 4. WS-Federation
  • 14.  WS-SecurityPolicy—Defines security assertions detailing a Web service’s requirements so that the service requester can meet them.  WS-Trust—Defines how to establish overall trust of the security system by acquiring any needed security tokens (such as Kerberos tickets) from trusted sources.
  • 15.  WS-SecureConversation—Defines how to establish and maintain a persistent context for a secure session over which multiple Web service invocations might be sent without requiring expensive authentication each time.  WS-Federation—Defines how to bridge multiple security domains into a federated session so that a Web service only has to be authenticated once to access Web services deployed in multiple security domains.
  • 16.  Messaging includes SOAP and its various message exchange patterns (MEP).  Reliable messaging is the mechanism that guarantees that one or more messages were received the appropriate number of times.  Reliable messaging specifications include:  WS-Reliability  WS-Reliable Messaging (from IBM and Microsoft)
  • 17.  Reliable messaging is a protocol for exchanging SOAP messages with guaranteed delivery, no duplicates, and guaranteed message ordering  It also supports the concept of bridging two proprietary messaging protocols over the Internet  It automates recovery from certain transport- level error conditions that the application would otherwise have to deal with on its own.
  • 18.  Transactions allow multiple operations, usually on persistent data, to succeed or fail as a unit, such as processing an order or transferring funds.
  • 19.  One of the most important aspects of transaction processing technologies is their ability to recover an application to a known state following an operating system or hard- ware failure.  For example, if any failure occurs before a funds transfer operation is completed (that is, both the debit and credit operations), transactions ensure the bank account balances are what they were before the funds transfer operation started.
  • 20.  Web services transaction specifications extend the concept of the transaction coordinator  adapt the familiar two-phase commit protocol for Web services  define new extended transaction protocols for more loosely coupled Web services and orchestration flows  Transaction coordinators currently exist in most execution environments, including J2EE, the .NET Framework, and CORBA  Web services specifications define extensions for coordinators for compensation-based protocols and long-running coordinator- coordinator protocols that bridge software domains.
  • 21.  It is a general mechanism for determining a consistent, predefined outcome for composite Web service applications.  The coordinator model includes two major phases:  acquisition phase  second phase
  • 22.  Acquisition phase - Web services that are participating in the composite are enrolled with the coordinator for a specific protocol (such as two-phase commit, compensation, or business process)  Second phase in which the coordinator drives the agreed-upon protocol to completion following the end of the execution of the set of services in the composite.  When a failure occurs, the coordinator is responsible for driving the recovery protocol
  • 23.  WS-Transactions family from BEA, IBM, and Microsoft:  WS-Atomic Transactions  WS-Business Activity  WS-Coordination  WS-Composite Application Framework (WS- CAF) from OASIS:  WS-Context  WS-Coordination Framework  WS-Transaction Management
  • 24.  Integrating mobile devices into an SOA presents specific challenges because the mobile devices may not always be connected to a network.  Mobile devices may also move through network connectivity zones, picking up new IP addresses when they reconnect.  “Mobilized” software is emerging to integrate mobile devices quickly and easily into the service- oriented enterprise.
  • 26.  The SOAP messages in a mobile software solution are transported from the mobile client to the server using a store-and-forward asynchronous protocol that allows the mobile client to keep working even when a network connection isn’t available  When the connection is available, transactions flow to the server-side SOA-based application directly using the messaging transport  When a connection isn’t available, transactions are stored locally so that they can be transmitted when a connection becomes available