{"title":"Survey of potential attacks on web services and web service compositions","authors":"Sunita Tiwari, Pratibha Singh","doi":"10.1109/ICECTECH.2011.5941653","DOIUrl":null,"url":null,"abstract":"Web services and web service composition are a new phase of distributed computing, build on the top of distributed models. Web services are being used largely for business integration. One of the major concerns for today's businesses is to implement adequate security for web services and web service compositions. Attacks on web services can sometimes destroy entire network and also can expose organization's valuable resources to outside world. As a result of our study we present in this paper some important vulnerabilities and possible attacks on web services and web service composition. Further we have listed important vulnerabilities in context of atomic and composite web services along with possible countermeasures.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 3rd International Conference on Electronics Computer Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECTECH.2011.5941653","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 17
Abstract
Web services and web service composition are a new phase of distributed computing, build on the top of distributed models. Web services are being used largely for business integration. One of the major concerns for today's businesses is to implement adequate security for web services and web service compositions. Attacks on web services can sometimes destroy entire network and also can expose organization's valuable resources to outside world. As a result of our study we present in this paper some important vulnerabilities and possible attacks on web services and web service composition. Further we have listed important vulnerabilities in context of atomic and composite web services along with possible countermeasures.