Skip to main content

Security Services

  • Reference work entry
  • First Online:
  • 13 Accesses

Synonyms

Authentication; Data confidentiality; Data integrity services

Definition

Given a set of local or distributed resources to be protected, a security service is a task (or set of tasks) that coherently performs processing or communication on behalf of the underlying system infrastructure, in order to support and employ several security requirements of both the system and the data sources. Such requirements involve authentication, PKI accessing, etc. over the underlying resources. Security services typically implement portions of security policies and are implemented via particular processes which are called security mechanisms.

Key Points

Security services are well documented and described in X.800 documentation [1] for almost all the layers from the physical up to the application layer, whereas focus on security services applied on the Web is given in [2]. Physical and data layer security services focus on support confidentiality at various levels, namely, at the connection and...

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   4,499.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   6,499.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Recommended Reading

  1. Recommendation X.800 Security architecture for open systems, interconnection for CCITT applications. http://fag.grm.hia.no/IKT7000/litteratur/paper/x800.pdf

  2. Stoupa K, Vakali A. Policies for web security services, chapter III. In: Ferrari E, Thuraisingham B, editors. Web and information security: Idea Group; 2006.

    Google Scholar 

  3. Faisal M, Al-Muhtadi J, Al-Dhelaan A. Integrated protocols to ensure security services in wireless sensor networks. Int J Distrib Sensor Networks. 2013;9(7):740392.

    Article  Google Scholar 

  4. Kang J, Adibi S. A review of security protocols in mHealth wireless body area networks (WBAN). In: Proceedings of the International Conference on Future Network Systems and Security; 2015. p. 61–83.

    Google Scholar 

  5. Fouad MMM, Hassanien AE. Key pre-distribution techniques for WSN security services, vol. 70. 2014. p. 265–83.

    Google Scholar 

  6. Yeo S-S, Kim S-J, Cho D-E. Dynamic access control model for security client services in smart grid. Int J Distrib Sensor Networks. 2014;10(6):81760. 7 pages

    Article  Google Scholar 

  7. Liang H, Huang D, Cai LX, Shen X, Peng D. Resource allocation for security services in mobile cloud computing. In: Proceedings of the IEEE Conference on Computer Communications Workshops; 2011.

    Google Scholar 

  8. Rosado DG, Fernández-Medina E, López J. Security services architecture for secure mobile grid systems. Spec Issue Secur Dependability Assur Software Archit. 2011;57(3):240–58.

    Google Scholar 

  9. Demchenko Y, De Laat C, Lopez DR, Garcia-Espin JA. Security services lifecycle management in on-demand infrastructure services provisioning. In: Proceedings of the 2nd IEEE International Conference on Cloud Computing Technology and Science; 30 Nov 2010–3 Dec 2010. p. 644, 650.

    Google Scholar 

  10. Shin S, Porras PA, Yegneswaran V, Fong MW, Gu G, Tyson M. FRESCO: modular composable security services for software-defined networks. In: Proceedings of the Network and Distributed Systems Security Symposium; 2013.

    Google Scholar 

  11. Sheng QZ, Qiao X, Vasilakos AV, Szabo C, Bourne S, Xu X. Web services composition: a decade’s overview. Inf Sci. 2014;280(Oct):218–38.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Athena Vakali .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Science+Business Media, LLC, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Vakali, A. (2018). Security Services. In: Liu, L., Özsu, M.T. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8265-9_1481

Download citation

Publish with us

Policies and ethics