{"title":"Security Problems of SOA Applications","authors":"M. Q. Saleem","doi":"10.14257/IJSIA.2017.11.11.03","DOIUrl":null,"url":null,"abstract":"Service Oriented Architecture has gained the popularity in the market because workflows of a business process can easily be realized by the composition of services. Post-development stages express the real strength of the SOA paradigm when a new business process can be realized by just composing existing services and a new application is developed by just assembling existing reusable services. However; due to increase in the number of services, connectivity between the services also increases which causes the rise of the security risk exponentially. Security, which is one of the most important aspects of any software system, is often neglected or given less importance while developing SOA applications. This paper compiled the work of different researchers working in the area of SOA security. The focus of the paper is to present the security problems of SOA applications highlighted by the several authors. These security problems must be addressed for the development of secure Services Oriented applications.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Security and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/IJSIA.2017.11.11.03","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Service Oriented Architecture has gained the popularity in the market because workflows of a business process can easily be realized by the composition of services. Post-development stages express the real strength of the SOA paradigm when a new business process can be realized by just composing existing services and a new application is developed by just assembling existing reusable services. However; due to increase in the number of services, connectivity between the services also increases which causes the rise of the security risk exponentially. Security, which is one of the most important aspects of any software system, is often neglected or given less importance while developing SOA applications. This paper compiled the work of different researchers working in the area of SOA security. The focus of the paper is to present the security problems of SOA applications highlighted by the several authors. These security problems must be addressed for the development of secure Services Oriented applications.
期刊介绍:
IJSIA aims to facilitate and support research related to security technology and its applications. Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of security technology and its applications. Journal Topics: -Access Control -Ad Hoc & Sensor Network Security -Applied Cryptography -Authentication and Non-repudiation -Cryptographic Protocols -Denial of Service -E-Commerce Security -Identity and Trust Management -Information Hiding -Insider Threats and Countermeasures -Intrusion Detection & Prevention -Network & Wireless Security -Peer-to-Peer Security -Privacy and Anonymity -Secure installation, generation and operation -Security Analysis Methodologies -Security assurance -Security in Software Outsourcing -Security products or systems -Security technology -Systems and Data Security