IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security by Integration, Correlation and Collaboration: Integrating Verification Reusable Agents in SOAP Messages

Security by Integration, Correlation and Collaboration: Integrating Verification Reusable Agents in SOAP Messages
View Free PDF
Author(s): Khalil A. Abuosba (Philadelphia University, USA)
Copyright: 2006
Pages: 2
Source title: Emerging Trends and Challenges in Information Technology Management
Source Editor(s): Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-59904-019-6.ch277
ISBN13: 9781616921286
EISBN13: 9781466665361

Abstract

Web Services deployment success is based on crucial reusability and availability factors. Composition of Web Services depends on tasks fulfillment of the delivery technologies along with successful analysis of design requirements. The purpose of web services deployment is to offer various industries powerful machine to machine interaction capabilities. Service success or failure depends on correctness of the service design blocks deployment. This paper addresses the major components required to fulfill successful web services delivery. It focuses on a hybrid approach of s/w design; for the purpose of abstracting heterogeneity of computing environments and platforms, we introduce an integrated security agent within a SOAP envelope which incorporates functionalities such as vulnerability reduction sensors. The agent’s functionality is to provide an auditing facility of vulnerabilities which may compromise a resource. These agents are proposed to be considered as a basic element of services design requirements for building SOAP based Web Services. These agents shall retrieve associated security vulnerabilities based on systems operational variables environments. The main functionalities of these agents are to define characteristics of systems environments for the purpose of filtering associated security vulnerabilities definitions in order to verify compliance of the systems security policy by alerting monitors.

Body Bottom