By Topic

A Post-Office-Inspired Closed-Security-Ring Model for Web Service Flow

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Qing-hua Meng ; College of Information Sciences and Technology, Donghua University, Shanghai 201620, China; Department of Computer Sciences and Technology, Weifang University, Shandong 261401, China ; Yong-sheng Ding

Inspired by post-office-federation, a security integrated model is designed. The model can provide convenient flexible security for Web service, and the closed-security-ring mechanism can integrate some security technologies in a completed procedure of business. The model includes four security control layers, and each layer provides different security function. The first layer can permit people to select proper security-grade for Web service. The second layer can ensure that Web service packages be securely transmitted. The third layer can fit complicated logical demands for commerce. The fourth layer can do a great deal of supervision to ensure the whole security. The mechanism running in the model is the closed-security-ring, which includes three security features such as closed-service-ring, closed-security-grade-ring, and closed-supervision-ring

Published in:

2006 International Conference on Machine Learning and Cybernetics

Date of Conference:

13-16 Aug. 2006