Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-5wvtr Total loading time: 0 Render date: 2024-07-22T15:43:35.079Z Has data issue: false hasContentIssue false

7 - E-services security

from III - E-security applications

Published online by Cambridge University Press:  11 September 2009

Mohammad Obaidat
Affiliation:
Monmouth University, New Jersey
Noureddine Boudriga
Affiliation:
Université du 7 Novembre à Carthage, Tunis
Get access

Summary

The Internet is growing to become the major means through which the services can be delivered electronically to businesses and customers. System vendors and service providers are pushing toward the definition of protocols, languages, and tools that support the improvement, use, and operation of electronic services. The main goal of the e-service paradigm is to provide the opportunity for defining value-added composite services by integrating other basic or composite services. However, security issues need to be addressed within such an open environment.

Introduction

The notion of service is getting increasingly valuable to many fields of communications and information technology. Nowadays, the current development in service provision through communication networks are moving from tightly joined systems towards services of loosely linked and dynamically related components. The major evolution in this category of applications is a new paradigm, called e-service, for which project developers and service providers are pushing for the definition of techniques, methods, and tools as well as infrastructures for supporting the design, development, and operation of e-services. Also, standards bodies are urging to specify protocols and languages to help the deployment in e-services.

E-services are self-contained and modular applications. They can be accessed via Internet and can provide a set of useful functionalities to businesses and individuals. Particularly, recent approaches to e-business typically view an e-service as an abstraction of a business process, in the sense that it represents an activity executed within an organization on behalf of a customer or another organization.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2007

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Bellwood, T. et al. (2002). UDDI Version 3.0. Published specification (available at http://uddi.org/pubs/uddi-v 3.00-published-20020719.html).
Brooke, P. (2000). Risk assessment strategies. Network Computing, 11 (21).Google Scholar
Casati, F., Ilinicki, S., Jin, L., and Chan, M. (2000). eFlow: An open, flexible, and configurable system for service composition. In Proceedings of WECWIS'00, Milpitas, CA, USA, June 2000.Google Scholar
Cerami, E. (2002). Web Services Essentials, 1st edn. O'Reilly & Associates.
ebXML (2001). ebXML Technical Architecture Specification v1.0.4 (available at http://www.ebxml.org).
ebXML (2001). ebXML Registry Services Specification v2.0 (available at http://www.ebxml.org/committees/regrep/documents/2.0/spects/ebRS.pdf.).
ebXML (2001). ebXML Collaboration-Protocol Profile and Agreement Specification v1.0.
Georgakopoulos, D., Shuster, H., Cichocki, A., and Baker, B. (1999). Managing process and service fusion in virtual entreprises. Information Systems: 24 (6), 429–56.Google Scholar
Guemara-ElFatmi, S. and Boudriga, N. (2003). A global Monitoring Process for securing e-government, 5th Jordanian Int. Electrical and Electronics Engineering Conf. (JIEEEC'03), Jordan, October 12–16, 2003.
Guemara-ElFatmi, S., Boudriga, N., and Obaidat, M. S. (2004). Relational-based calculus for trust management in networked services, Computer Communication Journal, 27 (12), 1206–19.CrossRefGoogle Scholar
Mehta, M., S. Singh, and Y. Lee (2000). Security in e-services and applications. In Network Security: Current Status and Future Directions, Douligeris, C. and Serpanos, D. N. (eds.), Wiley.Google Scholar
Nadalin et al. (2000). Web services security: SOAP message security, OASIS standard 200401 (available at http://docs.oasis-open/wss/2004/1oasis-soap-message-security-1.0).
Scannapieco, M., Mirabella, V., Mecella, M., and Batini, C. (2002). Data Quality in e-Business Applications. In Proceedings of CaiSE 2002, Springer-Verlag, LNCS 2512, pp. 121–38.Google Scholar
Schuster, H., Georgapoulos, D., Cichocki, A., and Baker, B., Modeling and composing service-based and reference process-based multi-enterprise process. In Proceedings of CaiSE 2000, LNCS 1789, Springer-Verlag, pp. 247–63.
Snell, J., Tidwell, D., and Kulchenko, P. (2002). Programming Web Services with SOAP 1st edn. O'Reilly & Associates.Google Scholar
SOAP (2000). http://www.w3/TR/SOAP
Tiwana, A. and B. Ramesh (2001). E-services: problems, oppportunities, and digital platforms, Proceedings of the IEEE 34th Hawaii International Conference on System Sciences, 2001.
Tsalgatidou, A. and Pilioura, T. (2002). An overview of standards and related technology in Web services. Distributed and Parallel Databases, 12, 135–62.CrossRefGoogle Scholar
WSDL (2000). http://msdn.microsoft.com/xml/general/wsdl.asp

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • E-services security
  • Mohammad Obaidat, Monmouth University, New Jersey, Noureddine Boudriga, Université du 7 Novembre à Carthage, Tunis
  • Book: Security of e-Systems and Computer Networks
  • Online publication: 11 September 2009
  • Chapter DOI: https://doi.org/10.1017/CBO9780511536700.011
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • E-services security
  • Mohammad Obaidat, Monmouth University, New Jersey, Noureddine Boudriga, Université du 7 Novembre à Carthage, Tunis
  • Book: Security of e-Systems and Computer Networks
  • Online publication: 11 September 2009
  • Chapter DOI: https://doi.org/10.1017/CBO9780511536700.011
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • E-services security
  • Mohammad Obaidat, Monmouth University, New Jersey, Noureddine Boudriga, Université du 7 Novembre à Carthage, Tunis
  • Book: Security of e-Systems and Computer Networks
  • Online publication: 11 September 2009
  • Chapter DOI: https://doi.org/10.1017/CBO9780511536700.011
Available formats
×