Font Size: a A A

Study Of Secure Access In Web Services And Implementation Method Based On Trust

Posted on:2008-03-09Degree:MasterType:Thesis
Country:ChinaCandidate:L LiuFull Text:PDF
GTID:2178360242456649Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Web services as well as service-oriented architectures (SOA), are emerging as the technologies and architectures of choice for implementing distributed systems. As a kind of technology capable of quickly integrating applications, Web Services has represented itself as the latest tide with wide potential prospect in distributed compute field. Web service is based on open standards and specifications. The emergence of web services defines these basic function and principle which satisfy the need of dynamic and timely business cooperation, which makes Web services not only as a platform of the information sharing, but also a platform of the services sharing. These characteristics make Web services an ideal solution of e-Business. However, the security problems that Web Services meets in practice have been restricting the development and application of Web Services. Security is a complex problem. But the main problem is to create a reasonable combination of accessibility and access restrictions.This dissertation presents the advantages of Web services which as a new distributed computing model through studying the concept of the web services and the core techniques that support the web services; presents the problem in Web services security through studying the requirement and the objective of the Web services security ;proposes a method based on trust to be applied secure access in Web services through studying on the related works and the status quo of the Web services security; After defining three kinds of trust, some related concepts and some rules of interaction in Web services ,this dissertation proposes some trust computing formulas , a algorithm using exponent function applied to adjust trust and the related information storage structure .Then a practical system is built and some use case scenario are simulated to verify the method. Furthermore, some ways to extend this approach to systems based on other techniques, are discussed; Final some prospects in future work are proposed.
Keywords/Search Tags:Web services, Trust, Secure access
PDF Full Text Request
Related items