Font Size: a A A

Improvement And Implementation Of Web Services Session Entity Authentication Protocol

Posted on:2006-05-05Degree:MasterType:Thesis
Country:ChinaCandidate:S F DengFull Text:PDF
GTID:2168360152971330Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Based on XML stands, Web Services technologies provide an excellent solution for dynamic e-business and EAI. It can make information sharing and resource reuse more easily, rapidly and flexibly. The Web service technologies allow the dynamic composition of a workflow or a business flow by composing a set of existing Web services scattered across the Internet. Because a specified Web Service deals with a request by its instance, a given Web service may have multiple service instances taking part in several workflows simultaneously. And at the other hand, a workflow often involves a set of service instances that belong to different Web services.In order toestablish trust relationships among service instances, new security protocols are urgently needed to make sure the operation security among service instances in the work-flow. Current Web Services security mechanism works in some degree, but it's far from perfect. Experts in IBM Tokyo Lab presented a session-oriented, multi-party authentication protocol model to resolve this problem. The protocol makes up current Web Services security technologies and protocols and gives a new solution for session authentication. But it also has some disadvantages.The paper analysis Web Services model and its security technologies, then make some improvement over key mechanism, anonym instance and session management protocol to make the protocol more secure and perfect. In the end, a Web Services transaction environment will be constructed, it can manage the communication between Web Services by using new Session Authentication Protocol. Based on testing and data analysis, the solution of new protocol can provide a trustful protection for Web Services session authentication, SA can fulfills corresponding management, monitor function and the improvement is successful and usable.
Keywords/Search Tags:Web Service, Service instance, Entity Authentication, DH algorithm, XML Encryption, Session key
PDF Full Text Request
Related items