InspectorGadget: Inferring Network Protocol Configuration for Web Services.

Author(s):  
Usama Naseer ◽  
Theophilus Benson
Author(s):  
Jana Polgar ◽  
Robert Mark Braum ◽  
Tony Polgar

Web services aim to provide application-to-application interoperability. Messages are exchanged between two parties called service provider and service requestor. The messages are described in an abstract way and then bound to a concrete network protocol and message format. The message exchange between provider and requester results in the invocation of an operation. A collection of operations represents an interface to the service. This interface is then bound to a concrete protocol and message format via one or more bindings. The interface definition and operation implementation are the responsibility of the service providers.


2014 ◽  
Vol 1 (1) ◽  
pp. 9-34
Author(s):  
Bobby Suryajaya

SKK Migas plans to apply end-to-end security based on Web Services Security (WS-Security) for Sistem Operasi Terpadu (SOT). However, there are no prototype or simulation results that can support the plan that has already been communicated to many parties. This paper proposes an experiment that performs PRODML data transfer using WS-Security by altering the WSDL to include encryption and digital signature. The experiment utilizes SoapUI, and successfully loaded PRODML WSDL that had been altered with WSP-Policy based on X.509 to transfer a SOAP message.


2004 ◽  
Vol 124 (1) ◽  
pp. 176-181
Author(s):  
Tomoaki Maruo ◽  
Keinosuke Matsumoto ◽  
Naoki Mori ◽  
Masashi Kitayama ◽  
Yoshio Izumi

Sign in / Sign up

Export Citation Format

Share Document