Secure web services using two-way authentication and three-party key establishment for service delivery
Access Status
Authors
Date
2009Type
Metadata
Show full item recordCitation
Source Title
ISSN
Faculty
School
Remarks
The link to the journal’s home page is: http://www.elsevier.com/wps/find/journaldescription.cws_home/505616/description#description. Copyright © 2009 Elsevier B.V. All rights reserved
Collection
Abstract
With the advance of web technologies, a large quantity of transactions have been processed through web services. Service Provider needs encryption via public communication channel in order that web services can be delivered to Service Requester. Such encryptions can be realized using secure session keys. Traditional approaches which can enable such transactions are based on peer-to-peer architecture or hierarchical group architecture. The former method resides on two-party communications while the latter resides on hierarchical group communications. In this paper, we will use three-party key establishment to enable secure communications for Service Requester and Service Provider. The proposed protocol supports Service Requester, Service Broker, and Service Provider with a shared secret key established among them. Compared with peer-to-peer architecture and hierarchical group architecture, our method aims at reducing communication and computation overheads.
Related items
Showing items related by title, author, creator and subject.
-
Chang, Elizabeth; Dillon, Tharam S.; Hussain, Farookh (2006)Trust has played a central role in human relationships and hence has been the subject of study in many fields including business, law, social science, philosophy and psychology. It has played a pivotal role in forming ...
-
Dong, Hai (2010)With the emergence of the Web and its pervasive intrusion on individuals, organizations, businesses etc., people now realize that they are living in a digital environment analogous to the ecological ecosystem. Consequently, ...
-
Radmand, Pedram (2012)This thesis develops an architectural framework to enhance the security of Wireless Sensor Networks (WSNs) and provides the implementation proof through different security countermeasures, which can be used to establish ...