Javascript must be enabled to continue!
Authentication Techniques for UDDI Registries
View through CrossRef
A Web service is a software system designed to support interoperable application-to-application interactions over the Internet. Web services are based on a set of XML standards, such as Web services description language (WSDL), simple object access protocol (SOAP) and universal description, discovery and integration (UDDI). A key role in the Web service architecture is played by UDDI registries, i.e., a structured repository of information that can be queried by clients to find the Web services that better fit their needs. Even if, at the beginning, UDDI has been mainly conceived as a public registry without specific facilities for security, today security issues are becoming more and more crucial, due to the fact that data published in UDDI registries may be highly strategic and sensitive. In this chapter, we focus on authenticity issues, by proposing a method based on Merkle hash trees, which does not require the party managing the UDDI to be trusted wrt authenticity. In the chapter, besides giving all the details of the proposed solution, we show its benefit wrt standard digital signature techniques.
Title: Authentication Techniques for UDDI Registries
Description:
A Web service is a software system designed to support interoperable application-to-application interactions over the Internet.
Web services are based on a set of XML standards, such as Web services description language (WSDL), simple object access protocol (SOAP) and universal description, discovery and integration (UDDI).
A key role in the Web service architecture is played by UDDI registries, i.
e.
, a structured repository of information that can be queried by clients to find the Web services that better fit their needs.
Even if, at the beginning, UDDI has been mainly conceived as a public registry without specific facilities for security, today security issues are becoming more and more crucial, due to the fact that data published in UDDI registries may be highly strategic and sensitive.
In this chapter, we focus on authenticity issues, by proposing a method based on Merkle hash trees, which does not require the party managing the UDDI to be trusted wrt authenticity.
In the chapter, besides giving all the details of the proposed solution, we show its benefit wrt standard digital signature techniques.
Related Results
ОСОБЛИВОСТІ ТЕХНОЛОГІЇ UDDI
ОСОБЛИВОСТІ ТЕХНОЛОГІЇ UDDI
Стаття присвячена аналізу Universal Description, Discovery and Integration (UDDI) як стандарту для опису, реєстрації та пошуку Web-сервісів у рамках сервіс-орієнтованої архітектури...
Merkle Tree Authentication in UDDI Registries
Merkle Tree Authentication in UDDI Registries
UDDI registries are today the standard way of publishing information on Web services. They can be thought of as a structured repository of information that can be queried by client...
303 Mapping the Landscape of Surgical Registries in the United Kingdom
303 Mapping the Landscape of Surgical Registries in the United Kingdom
Abstract
Introduction
Well-designed surgical registries are essential for high-quality patient-centred evaluation of implantable...
Ethics practices associated with reusing health data: An assessment of patient registries
Ethics practices associated with reusing health data: An assessment of patient registries
Abstract
Background
As routinely collected patient data have become increasingly accessible over the years, more and more atten...
Physical therapy registries worldwide: A systematic review
Physical therapy registries worldwide: A systematic review
AbstractIntroductionNowadays, the demand for physical therapy services has grown significantly over the last few decades due to an aging population, a rise in chronic conditions, a...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract
In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
A review of North American orthopaedic trauma and fracture registries
A review of North American orthopaedic trauma and fracture registries
Abstract
In North America, orthopaedic trauma and fracture registries can be broadly categorized into 4 groups: national registries without subscription, national registr...
Attribute-based multiuser authentication scheme between IoT devices for 5G environment
Attribute-based multiuser authentication scheme between IoT devices for 5G environment
Background/Objectives: Due to the development of mobile communication technology, infrastructure construction from 4G to 5G service, which is currently being serviced, is actively ...

