A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...
From confidentiality, integrity, and availability to authentication, authorization, and audit, find out how you can employ best practices to make Web services secure. Eighteen months ago "Web services ...
COMMENT--The rise of internetworking was fueled by the use of network-level security technologies such as SSL, IPSec and firewall filtering to create a secure perimeter around an enterprise network.
A number of unmet security needs remain, including nonrepudiation for transactions, securing credentials, use of covert channels to access services, use of SOAP to distribute malicious code, denial-of ...
Web services! Chances are you’ve already developed some Web services yourself, or at the very least have heard something about them. While people have put forth numerous Web services definitions, the ...
As I mentioned in previous columns, there’s a new set of draft documents from the Computer Security Resource Center (CSRC) of the U.S. National Institute of Standards and Technology (NIST). SP 800-95, ...
This is the second installment of a three-part article examining techniques used to architect secure Web services. Part one introduced a fictional company, The Internet Dictionary Company (TIDC) and ...
Web services and binary attachments have proved a difficult pair to make work well together when it's time to implement security. But new functionality in Web Services Enhancement 3.0 (WSE3) should ...
Security is important for any distributed computing environment. But, security is becoming even more important for Web services due to the following reasons: The boundary of interaction between ...
eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. Gwen Alexander Moertel isnt the cheerleader type who jumps ...
Securing Web services is easy: All you have to do is secure your Web server, secure every message flowing in and out of your server, secure every application that has anything to do with SOAP and XML, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results