Authentication Techniques for UDDI Registries

Authentication Techniques for UDDI Registries

Elisa Bertino (Purdue University, USA), Barbara Carminati (University of Insubria at Varese, Italy) and Elena Ferrari (University of Insubria at Varese, Italy)
Copyright: © 2007 |Pages: 22
DOI: 10.4018/978-1-59904-280-0.ch002
OnDemand PDF Download:
$37.50

Abstract

A Web service is a software system designed to support interoperable application-to-application interactions over the Internet. Web services are based on a set of XML standards, such as Web services description language (WSDL), simple object access protocol (SOAP) and universal description, discovery and integration (UDDI). A key role in the Web service architecture is played by UDDI registries, i.e., a structured repository of information that can be queried by clients to find the Web services that better fit their needs. Even if, at the beginning, UDDI has been mainly conceived as a public registry without specific facilities for security, today security issues are becoming more and more crucial, due to the fact that data published in UDDI registries may be highly strategic and sensitive. In this chapter, we focus on authenticity issues, by proposing a method based on Merkle hash trees, which does not require the party managing the UDDI to be trusted wrt authenticity. In the chapter, besides giving all the details of the proposed solution, we show its benefit wrt standard digital signature techniques.

Complete Chapter List

Search this Book:
Reset