Font Size: a A A

Research On The Web Service Security Evaluation Based On Testing Vulnerabilities

Posted on:2011-03-26Degree:MasterType:Thesis
Country:ChinaCandidate:Y GaoFull Text:PDF
GTID:2178360308990382Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Service-oriented-architecture is a new distributed computing technology. It is in the form of service for encapsulation, application and publishing. QOS is a part in the problems of service-oriented-architecture. Traditionally, evaluation of QOS is given after using the service, and the evaluation is fuzzy. But when we choose a service, it is important and necessary to know the QOS of service, especially the QOS of service with quantitative evaluation. In the QOS attributes of Web services, some are easy to evaluate quantitatively, but some are not. Security attribute belongs to the latter. Compared with other QOS attributes, security attribute becomes more and more important with the development of Web services application. But same with all security evaluation, it is difficult to give Web services a scientific, objective and credible security evaluation.There are many factors affecting the security of Web services, and these factors are changing with the development of technology. Nowadays, there are several vulnerabilities threatening Web Services security, so it is meaningful and helpful to evaluate them quantitatively with objectivity and rationality, in order that it is to not only reflect the security of service reasonably and directly, but also helpful to choose and deploy security measures and ensure the quality of service. This article uses AHP method to dissect security indicators that with fuzzy structure, and uses operations research and fuzzy mathematical theory to construct evaluation system for evaluating security in QOS. This method describes the security more accurately than before, so it reflect the security of Web services reasonably and directly, and solves the bottleneck of Web services quality management. This method is instructive to the other subproblems of QOS.
Keywords/Search Tags:Web Service, QOS, Vulnerability, Security, AHP
PDF Full Text Request
Related items