Academic literature on the topic 'Web service security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Web service security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Web service security"
Geuer-Pollmann, Christian, and Joris Claessens. "Web services and web service security standards." Information Security Technical Report 10, no. 1 (2005): 15–24. http://dx.doi.org/10.1016/j.istr.2004.11.001.
Full textRouached, Mohsen. "Web Service Composition Security." International Journal of Service Science, Management, Engineering, and Technology 12, no. 3 (2021): 154–74. http://dx.doi.org/10.4018/ijssmet.2021050109.
Full textRaepple, Martin. "Web service security netiquette." Datenschutz und Datensicherheit - DuD 31, no. 9 (2007): 648–51. http://dx.doi.org/10.1007/s11623-007-0216-8.
Full textSundar, Priya, R. Raju, P. Mahalakshmi, and G. Lalitha. "Providing security for Web Service Composition using Finite State Machine." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (2005): 435–44. http://dx.doi.org/10.24297/ijct.v4i2b1.3232.
Full textAniyikaiye, Jide, and Emmanuel Udoh. "Web Services Gateway." International Journal of Grid and High Performance Computing 8, no. 1 (2016): 85–92. http://dx.doi.org/10.4018/ijghpc.2016010108.
Full textIacono, Luigi Lo, and Jun Wang. "Web service layer security (WSLS)." Network Security 2008, no. 2 (2008): 10–13. http://dx.doi.org/10.1016/s1353-4858(08)70018-7.
Full textYue, Hua, and Xu Tao. "Web Services Security Problem in Service-oriented Architecture." Physics Procedia 24 (2012): 1635–41. http://dx.doi.org/10.1016/j.phpro.2012.02.241.
Full textHee, Kai-Cheong, and Chiung Ching Ho. "Design of Application Layer Services for Security Automation via a Web Service Approach." Journal of Advances in Computer Networks 2, no. 1 (2014): 76–84. http://dx.doi.org/10.7763/jacn.2014.v2.86.
Full textMartino, Lorenzo D., and Elisa Bertino. "Security for Web Services." International Journal of Web Services Research 6, no. 4 (2009): 48–74. http://dx.doi.org/10.4018/jwsr.2009071303.
Full textLiu, Yao Qin. "Research on Security Architecture Based on Web Service System." Applied Mechanics and Materials 687-691 (November 2014): 1716–19. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1716.
Full textDissertations / Theses on the topic "Web service security"
Bill, Andreas, and Robert Persson. "A secure web service : Specification on how to implement a secure Web service in a health care environment." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-365.
Full textNgu, Phuc Huy. "Web applications - New mobile service paradigm." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-19040.
Full textChatterjee, Ash. "Leveraging service oriented architecture to enhance information sharing for surface transportation security." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Sept/08Sep%5FChatterjee.pdf.
Full textMoyo, Thamsanqa. "An investigation into interoperable end-to-end mobile web service security." Thesis, Rhodes University, 2008. http://eprints.ru.ac.za/1137/.
Full textErickson, Adam, and Oscar Nielsen. "Keep our web applications safe : A security evaluation of Service Workers." Thesis, Linköpings universitet, Programvara och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-161753.
Full textOphoff, Jacobus Albertus. "WSP3: a web service model for personal privacy protection." Thesis, Port Elizabeth Technikon, 2003. http://hdl.handle.net/10948/272.
Full textSingaravelu, Lenin. "End-to-End Security of Information Flow in Web-based Applications." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/16142.
Full textKondamudi, Harini. "Web Service for Knowledge Management Information Tool (KMIT) Hotline module and its Security." FIU Digital Commons, 2010. http://digitalcommons.fiu.edu/etd/262.
Full textMetin, Mehmet Ozer. "Creating Application Security Layer Based On Resource Access Decision Service." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/12608827/index.pdf.
Full textSkogsrud, Halvard Computer Science & Engineering Faculty of Engineering UNSW. "Trust negotiation policy management for service-oriented applications." Awarded by:University of New South Wales. Computer Science and Engineering, 2006. http://handle.unsw.edu.au/1959.4/25723.
Full textBooks on the topic "Web service security"
Bertino, Elisa, Lorenzo Martino, Federica Paci, and Anna Squicciarini. Security for Web Services and Service-Oriented Architectures. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-540-87742-4.
Full textLorenzo, Martino, Paci Federica, Squicciarini Anna, and SpringerLink (Online service), eds. Security for Web Services and Service-Oriented Architectures. Springer-Verlag Berlin Heidelberg, 2010.
Find full text1977-, Gutierrez Carlos, Fernandez-Medina Eduardo 1973-, and Piattini Mario 1966-, eds. Web services security development and architecture: Theoretical and practical issues. Information Science Reference, 2010.
Find full textWiehler, Gerhard. Mobility, Security und Web Services: Neue Technologien und Service-orientierte Architekturen für zukunftsweisende IT-Lösungen. Publicis Corporate Pub., 2004.
Find full textAxel, Bücker, and International Business Machines Corporation. International Technical Support Organization., eds. Understanding SOA security: Design and implementation. IBM, 2007.
Find full textZhang, Liang-Jie. Web services research for emerging applications: Discoveries and trends. Information Science Reference, 2010.
Find full textLiang-Jie, Zhang, ed. Web services research for emerging applications: Discoveries and trends. Information Science Reference, 2010.
Find full textMalik, Zaki. Trust Management for Service-Oriented Environments. Springer-Verlag US, 2009.
Find full textBook chapters on the topic "Web service security"
Damiani, Ernesto. "Web Service Security." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_668.
Full textBertino, Elisa, Lorenzo D. Martino, Federica Paci, and Anna C. Squicciarini. "Standards for Web Services Security." In Security for Web Services and Service-Oriented Architectures. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-87742-4_4.
Full textBaer, Daniel, Andreas Philipp, and Norbert Pohlmann. "Web Service Security — XKMS (TrustPoint)." In ISSE 2004 — Securing Electronic Business Processes. Vieweg+Teubner Verlag, 2004. http://dx.doi.org/10.1007/978-3-322-84984-7_25.
Full textBertino, Elisa, Lorenzo D. Martino, Federica Paci, and Anna C. Squicciarini. "Access Control for Web Services." In Security for Web Services and Service-Oriented Architectures. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-87742-4_6.
Full textBertino, Elisa, Lorenzo D. Martino, Federica Paci, and Anna C. Squicciarini. "Web Services Threats, Vulnerabilities, and Countermeasures." In Security for Web Services and Service-Oriented Architectures. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-87742-4_3.
Full textBertino, Elisa, Lorenzo D. Martino, Federica Paci, and Anna C. Squicciarini. "Web Service Technologies, Principles, Architectures, and Standards." In Security for Web Services and Service-Oriented Architectures. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-87742-4_2.
Full textHasan, Jeffrey. "Secure Web Services with WS-Security." In Expert Service-Oriented Architecture in C#. Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0747-4_6.
Full textNakamura, Yuichi, Fumiko Sato, and Hyen-Vui Chung. "Syntactic Validation of Web Services Security Policies." In Service-Oriented Computing – ICSOC 2007. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74974-5_26.
Full textGhourabi, Abdallah, Tarek Abbes, and Adel Bouhoula. "Behavior Analysis of Web Service Attacks." In ICT Systems Security and Privacy Protection. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55415-5_31.
Full textBertino, Elisa, Lorenzo D. Martino, Federica Paci, and Anna C. Squicciarini. "Introduction." In Security for Web Services and Service-Oriented Architectures. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-87742-4_1.
Full textConference papers on the topic "Web service security"
Carminati, Barbara, Elena Ferrari, and Patrick K. Hung. "Security Conscious Web Service Composition." In 2006 IEEE International Conference on Web Services (ICWS'06). IEEE, 2006. http://dx.doi.org/10.1109/icws.2006.115.
Full textWu, Jian, and Zhimin Huang. "Proxy-Based Web Service Security." In 2008 IEEE Asia-Pacific Services Computing Conference (APSCC). IEEE, 2008. http://dx.doi.org/10.1109/apscc.2008.216.
Full textYe, Xinfeng, and Lei Zhong. "Improving Web Service Security and Privacy." In 2011 IEEE World Congress on Services (SERVICES). IEEE, 2011. http://dx.doi.org/10.1109/services.2011.109.
Full textGarcia, Diego Zuquim Guimarães, and Maria Beatriz Felgar de Toledo. "Web service security management using semantic web techniques." In the 2008 ACM symposium. ACM Press, 2008. http://dx.doi.org/10.1145/1363686.1364225.
Full textAgreindra Helmiawan, Muhamad, Esa Firmansyah, Irfan Fadil, Yanvan Sofivan, Fathoni Mahardika, and Agun Guntara. "Analysis of Web Security Using Open Web Application Security Project 10." In 2020 8th International Conference on Cyber and IT Service Management (CITSM). IEEE, 2020. http://dx.doi.org/10.1109/citsm50537.2020.9268856.
Full textPencheva, Evelina, and Ivaylo Atanasov. "Web Services for Quality of Service Monitoring." In 2009 3rd International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 2009. http://dx.doi.org/10.1109/ntms.2009.5384834.
Full textYamany, Hany F. EL, Miriam A. M. Capretz, and David S. Allison. "Quality of Security Service for Web Services within SOA." In 2009 IEEE Congress on Services (SERVICES). IEEE, 2009. http://dx.doi.org/10.1109/services-i.2009.95.
Full textImamura, Takeshi, Michiaki Tatsubori, Yuichi Nakamura, and Christopher Giblin. "Web services security configuration in a service-oriented architecture." In Special interest tracks and posters of the 14th international conference. ACM Press, 2005. http://dx.doi.org/10.1145/1062745.1062898.
Full textNarula, Saakshi, Arushi Jain, and Prachi. "Cloud Computing Security: Amazon Web Service." In 2015 Fifth International Conference on Advanced Computing & Communication Technologies (ACCT). IEEE, 2015. http://dx.doi.org/10.1109/acct.2015.20.
Full textMovahednejad, Homa, Suhaimi Bin Ibrahim, Mahdi Sharifi, Harihodin Bin Selamat, and Sayed Gholam Hassan Tabatabaei. "Security-aware web service composition approaches." In the 13th International Conference. ACM Press, 2011. http://dx.doi.org/10.1145/2095536.2095557.
Full textReports on the topic "Web service security"
Rao, Jinghai, and Norman Sadeh. Interleaving Semantic Web Reasoning and Service Discovery to Enforce Context-Sensitive Security and Privacy Policies. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada456148.
Full textAldrich, Susan. Web Services Security Issues and Antidotes. Patricia Seybold Group, 2003. http://dx.doi.org/10.1571/ii2-27-03cc.
Full textNovakouski, Maro, Soumya Simanta, Gunnar Peterson, Ed Morris, and Grace Lewis. Performance Analysis of WS-Security Mechanisms in SOAP-Based Web Services. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada536681.
Full textWrage, Lutz, Soumya Simanta, Grace A. Lewis, and Saul Jaspan. T-Check in Technologies for Interoperability: Web Services and Security--Single Sign-On. Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada479241.
Full textBassi, Marina. What Do You Think of the IDB?: Conclusions from an Opinion Survey of Latin American Leaders about Multilateral Organizations. Inter-American Development Bank, 2007. http://dx.doi.org/10.18235/0010879.
Full textChaimite, Egidio, Salvador Forquilha, and Alex Shankland. Who Can We Count On? Authority, Empowerment and Accountability in Mozambique. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/ids.2021.019.
Full textThomas, Jakana. Gendered Security Sector Reform: What Can We Learn from Women’s Participation in Community-Based Armed Groups? RESOLVE Network, 2022. http://dx.doi.org/10.37805/pn2022.1.cbags.
Full textScholl, Lynn, Daniel Oviedo, and Orlando Sabogal-Cardona. Disrupting Personal (In)Security? The Role of Ride-Hailing Service Features, Commute Strategies, and Gender in Mexico City. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003812.
Full textNickle, John. The Role of Health Services Support in the Theater Security Cooperation Plan: Do We Have It Right. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada426005.
Full textAzuara Herrera, Oliver, Mariano Bosch, and Eric Torres Ramirez. Employment and Living Conditions of the Population over 50 in Latin America. Inter-American Development Bank, 2023. http://dx.doi.org/10.18235/0005146.
Full text