Advertisement

Implementation of Streamlining PKI System for Web Services

  • Namje Park
  • Kiyoung Moon
  • Jongsu Jang
  • Sungwon Sohn
  • Dongho Won
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3480)

Abstract

XKMS (XML Key Management Specification), one of web services security specification, defines the protocol for distributing and registering public keys for verifying digital signatures and enciphering XML documents of web service applications with various and complicate functions. In this paper, we propose XKMS-based streamlining PKI service model and design protocol component based on standard specification. Also describes the analysis and security method of PKI service for secure web services, paying attention to the features of XML based security service. This service model offers the security construction guideline for future global web services frameworks.

Keywords

Request Message Service Attack Service Protocol Asynchronous Processing Protocol Component 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    W3C Note: XML Key Management(XKMS 2.0) Requirements (2003) Google Scholar
  2. 2.
    W3C Working Draft: XML Key Management Specification Version 2.0. (2003) Google Scholar
  3. 3.
    W3C/IETF Recommendation: XML-Signature Syntax and Processing (2002) Google Scholar
  4. 4.
    W3C Recommendation: XML Encryption Syntax and Processing (2003) Google Scholar
  5. 5.
    RFC 2459: X.509 Certificate and CRL Profile (1999) Google Scholar
  6. 6.
    RFC 2510: Certificate Management Protocol (1999) Google Scholar
  7. 7.
    A Delphi Group: Web Services 2002:Market Milestone Report. A Delphi Group White Paper. IBM (2002) Google Scholar
  8. 8.
    Holbrook, S.: Web Services Architecture-Technical Overview of the Pieces. IBM (2002)Google Scholar
  9. 9.
    Roh, J., Jin, S., Lee, K.: Certificate Path Construction and Validation in CVS. KICS-Korea IT Forum (2002)Google Scholar
  10. 10.
    OASIS: Web Service Security (2002), http://www-106.ibm.com/
  11. 11.
    Munoz, J.L., et al.: Using OCSP to Secure Certificate-Using Transactions in M-commerce. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 280–292. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  12. 12.
    Park, N., et al.: Development of XKMS-Based Service Component for Using PKI in XML Web Services Environment. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 784–791. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  13. 13.
    Lee, S.-M., et al.: TY*SecureWS:An Integrated Web Service Security Solution Based on Java. In: Bauknecht, K., Tjoa, A.M., Quirchmayr, G. (eds.) EC-Web 2003. LNCS, vol. 2738, pp. 186–195. Springer, Heidelberg (2005)Google Scholar
  14. 14.
    Jeong, Y., et al.: A Trusted Key Management Scheme for Digital Rights Management. ETRI Journal 27(1), 114–117 (2005)CrossRefGoogle Scholar
  15. 15.
    Elliott, S.J.: fferentiation of Signature Traits vis-à-vis Mobile- and Table- Based Digitizers. ETRI Journal 26(6), 641–646 (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Namje Park
    • 1
  • Kiyoung Moon
    • 1
  • Jongsu Jang
    • 1
  • Sungwon Sohn
    • 1
  • Dongho Won
    • 2
  1. 1.Information Security Research DivisionETRIDaejeonKorea
  2. 2.School of Information and Communication EngineeringSungkyunkwan UniversityGyeonggi-doKorea

Personalised recommendations