CFP last date
20 December 2024
Reseach Article

SOAP Protocol Based Web Security Improvement

Published on None 2011 by Manusankar.C, S.Karthik
International Conference on VLSI, Communication & Instrumentation
Foundation of Computer Science USA
ICVCI - Number 14
None 2011
Authors: Manusankar.C, S.Karthik
d904a727-0428-45d8-93dd-d01a6a0c91b0

Manusankar.C, S.Karthik . SOAP Protocol Based Web Security Improvement. International Conference on VLSI, Communication & Instrumentation. ICVCI, 14 (None 2011), 30-32.

@article{
author = { Manusankar.C, S.Karthik },
title = { SOAP Protocol Based Web Security Improvement },
journal = { International Conference on VLSI, Communication & Instrumentation },
issue_date = { None 2011 },
volume = { ICVCI },
number = { 14 },
month = { None },
year = { 2011 },
issn = 0975-8887,
pages = { 30-32 },
numpages = 3,
url = { /proceedings/icvci/number14/2736-1531/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on VLSI, Communication & Instrumentation
%A Manusankar.C
%A S.Karthik
%T SOAP Protocol Based Web Security Improvement
%J International Conference on VLSI, Communication & Instrumentation
%@ 0975-8887
%V ICVCI
%N 14
%P 30-32
%D 2011
%I International Journal of Computer Applications
Abstract

This paper mainly focuses on Web Security.This paper mainly implements SOAP protocol using MD5, 3DES Algorithm. It provides high security by combining 3DES, MD5 in the SOAP message. 3DESalgorithmis used for Encryption and MD5 For message digest. This method is more flexible, scalable than previous technologies. By using this technique the application can be used in EAI technology with no data loss. The technology can provide authentication, confidentiality for the data. This technology is being implemented in this paper and by combining Application Layer and Transport Layer.

References
  1. Wang Ziyao.The core technology and application of SOA.Beijing: House of Electronics Industry,2008-5
  2. Meng Wei, Zhang Chen, LI Jun-huai, LIU Hai-ling. Web services security model and implementation. Computer Engineering and Application, 2006,26 134-136
  3. (U.S.) O'Neill. Web Services Security technology and theory. RanXiao Man, Guo Wenwei translation. Beijing: Tsinghua University
  4. XML-Signature Syntax and Processing.http://w3c.org/TR/2002/REC-xmldsig-core-20020212/;2002, 2
  5. XML Encryption Requirements. http://www.w3.org/TR/xmlencryption-req; 2002, 3
  6. Rivest, R., "The MD4 Message Digest Algorithm", RFC 1320, MITand RSA Data Security, Inc., April 1992..
  7. Rivest, R., "The MD4 message digest algorithm", in A.J. Menezesand S.A. Vanstone, editors, Advances in Cryptology - CRYPTO '90Proceedings, pages 303-311, Springer-Verlag
Index Terms

Computer Science
Information Sciences

Keywords

WebSecutity SOAPProtocol 3DES MD5 Algorithm EAI Technology