• Keine Ergebnisse gefunden

Proceedings of the workshop on security for web services and service-oriented architectures

N/A
N/A
Protected

Academic year: 2022

Aktie "Proceedings of the workshop on security for web services and service-oriented architectures"

Copied!
1
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Proceedings of the Workshop on Security for Web Services and Service-Oriented Architectures

Web Services are regarded as the premier building blocks of Service-Oriented Architec- tures (SOA). Founding on specifications for basic communication patterns and message syntax, a lot of additional Web Service specifications that address non-functional require- ments have been introduced. The most relevant specifications for these non-functional requirements deal with security aspects of Web Services, like confidentiality and integrity of Web Service messages (e.g. WS-Security), authorization and access control issues (XACML), or definition of security policies (WS-SecurityPolicy).

The existing Web Service specifications offer new perspectives to solve long-standing open problems in IT security, e.g. machine readable descriptions of security policies (WS- Policy) or broad interoperability of cryptographic technologies (WS-Trust). This is, how- ever, achieved by dramatically increasing the semantic complexity of the cryptographic data formats (e.g. XML Signature): As attacks described by Austel and McIntosh from IBM TJ Watson have shown, a Boolean function is no longer sufficient to check the valid- ity of digital signatures.

Further, there are security-related issues that are not covered by the existing specifications.

For example, availability considerations for Web Services and security support for Web Service compositions did not receive broad attention yet. Especially the emerging ap- proach of realizing business processes with Web Services (e.g. using WS-BPEL) imposes the necessity for security considerations at the process level in addition to security at the messaging level. Process level security is yet an open issue, both in terms of Web Service specifications and research.

The target of this workshop is to bring together researchers and industry practitioners that are engaged in all kinds of security issues related to Web Services, Web Service com- positions and Service-Oriented Architectures in general. It is intended to be a forum for presenting and exchanging new ideas, discussing security problems with existing specifi- cations and exploring new fields in the area of enabling security, privacy and trust for Web Services and Service-Oriented Architecture.

We want to express our thanks to all authors who submitted their papers to this workshop and to our board of reviewers. Though being a rather small workshop in the end, we think the high quality of the resulting proceedings illustrates the importance and necessity of discussion on this hot research topic.

July 2008, Norbert Luttenberger Meiko Jensen

109

Referenzen

ÄHNLICHE DOKUMENTE

ƒ Ports eines Service sollen semantisch äquivalente Alternativen einer abstrakten Schnittstelle

EMPTY: leerer Inhalt, Element kann aber Attribute haben EMPTY!. <!ELEMENT br EMPTY> Î <

- theoretisch aber auch synchron: Sender solange blockiert, bis Empfang der Nachricht bestätigt flüchtige Kommunikation. - auch in der Praxis sowohl synchron als auch

ƒ Seit SOAP 1.2 steht SOAP nicht mehr für Simple Object Access Protocol.

ƒ beschreibt die Schnittstelle (Syntax) eines Web- Dienstes und wo dieser abgerufen werden kann. ƒ baut auf

Secondly, a (successful) Web service composition process requires more information about the user and his requirements and preferences than an atomic Web service discovery (which is

In this paper, we will reconsider some of the known flooding attacks on Web Ser- vices, advance to flooding issues of basic service compositions, and finally derive some conclusions

Genau genommen kann festgestellt werden, dass Sicher- heit kein eigentliches Merkmal einer SOA ist, sondern dass Einfachheit, Sicherheit und Akzeptanz notwendige Voraussetzungen