A Survey on Authorization Systems for Web Applications
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: Web services are the most important point of usage for the modern web architecture. The Serviceoriented architecture (SOA) used in web services offers a simple platform for integrating heterogeneousdistributed web applications and service. The distributed and open nature of the present system makes itvulnerable to security issues such as Web service Description Language (WSDL) spoofing, MiddlewareHijacking, etc. Assuring security for the web services to solve all security flaws is difficult. Authorization is animportant aspect for assuring security. Authorization failure can create much vulnerability for the systemsecurity using web services which are distributed in nature. In this paper a survey of the authorizationtechniques for web services based application
Authors and Affiliations
Mr. Midhun TP, , Mr. Prasanth Kumar PV , Mr. Anoop Jose
Design of Layers in Knowledgebase For Expert Systems
Abstract: In any Expert System, Knowledge is the basic functional unit for building a knowledgebase[1]. Hence, Expert Systems are totally/partially depended on Knowledgebases for its intelligent functionality. In our pro...
Name Entity Recognition by New Framework Using Machine Learning Algorithm
Abstract: The amount of textual information available electronically has made it difficult for many users to find and access the right information within acceptable time. Research communities in the natural languag...
Advanced Lightweight BFT Process ForTrustworthy Management inWeb Services Computing System
Abstract: The project entitled as “Trustworthy Coordination of Web Services Atomic Transactions”. The consumer will enter their customer id and PIN for accessing their account details. They can view all the account...
A Study of Various Spoofing Attacks and Attackers in Wireless Networks.
Abstract: Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional se...
Providing efficient measurable key by using unital based key pre-distribution scheme for wireless sensor networks
Abstract: Resource limitations and potential WSNs application and key management are the challenging issues for WSNs. Network scalability is one of the important things in designing a key management scheme. So we a...