Sinha et al., 2008 - Google Patents
A formal solution to rewriting attacks on SOAP messagesSinha et al., 2008
- Document ID
- 15269207258691953941
- Author
- Sinha S
- Benameur A
- Publication year
- Publication venue
- Proceedings of the 2008 ACM workshop on Secure web services
External Links
Snippet
In Service Oriented Architecture Web Services, communication among services is banking on XML-Based messages, called SOAP messages. These messages are prone to attacks that are classified in literature as XML rewriting attacks. Since rewriting is a formal …
- 239000000344 soap 0 title abstract description 52
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Reed et al. | Decentralized identifiers (dids) v1. 0 | |
| EP2173058B1 (en) | Context free and context sensitive XML digital signatures for SOAP messages | |
| JP4949232B2 (en) | Method and system for linking a certificate to a signed file | |
| Gajek et al. | Analysis of signature wrapping attacks and countermeasures | |
| US20070220260A1 (en) | Protecting the integrity of electronically derivative works | |
| US8375211B2 (en) | Optimization of signing soap body element | |
| Gajek et al. | Breaking and fixing the inline approach | |
| US20040078577A1 (en) | Method and apparatus for providing xml document encryption | |
| US7293283B2 (en) | Flexible electronic message security mechanism | |
| Lax et al. | Digital document signing: Vulnerabilities and solutions | |
| Sinha et al. | A formal solution to rewriting attacks on SOAP messages | |
| Wen et al. | Two Zero-Watermark methods for XML documents | |
| Eastlake et al. | Secure XML: The New Syntax for Signatures and Encryption | |
| Bartel et al. | XML signature syntax and processing version 1.1 | |
| Bhargavan et al. | A semantics for web services authentication | |
| Polivy et al. | Authenticating distributed data using Web services and XML signatures | |
| Modak et al. | Vulnerability of cloud: Analysis of XML signature wrapping attack and countermeasures | |
| Bull et al. | A hierarchical extraction policy for content extraction signatures: Selectively handling verifiable digital content | |
| Makino et al. | Improving WS-Security performance with a template-based approach | |
| Taft et al. | The application/pdf media type | |
| Barhoom et al. | Position of signed element for SOAP message integrity | |
| Islam et al. | An approach to security for unstructured big data | |
| Sun et al. | XML undeniable signatures | |
| Abd El-Aziz et al. | A comprehensive presentation to XML signature and encryption | |
| Xavier | XML based security for e-commerce applications |