Reference Hub11
Merkle Tree Authentication in UDDI Registries

Merkle Tree Authentication in UDDI Registries

Elisa Bertino, Barbara Carminati, Elena Ferrari
Copyright: © 2004 |Volume: 1 |Issue: 2 |Pages: 21
ISSN: 1545-7362|EISSN: 1546-5004|ISSN: 1545-7362|EISBN13: 9781615204656|EISSN: 1546-5004|DOI: 10.4018/jwsr.2004040103
Cite Article Cite Article

MLA

Bertino, Elisa, et al. "Merkle Tree Authentication in UDDI Registries." IJWSR vol.1, no.2 2004: pp.37-57. http://doi.org/10.4018/jwsr.2004040103

APA

Bertino, E., Carminati, B., & Ferrari, E. (2004). Merkle Tree Authentication in UDDI Registries. International Journal of Web Services Research (IJWSR), 1(2), 37-57. http://doi.org/10.4018/jwsr.2004040103

Chicago

Bertino, Elisa, Barbara Carminati, and Elena Ferrari. "Merkle Tree Authentication in UDDI Registries," International Journal of Web Services Research (IJWSR) 1, no.2: 37-57. http://doi.org/10.4018/jwsr.2004040103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

UDDI registries are today the standard way of publishing information on Web services. They can be thought of as a structured repository of information that can be queried by clients to find the Web services that better fit their needs. Even if, at the beginning, UDDI has been mainly conceived as a public registry without specific facilities for security, today security issues are becoming more and more crucial, due to the fact that data published in UDDI registries may be highly strategic and sensitive. In this paper, we focus on authenticity issues by proposing a method based on Merkle Hash Trees, which does not require the party managing the UDDI to be trusted with authenticity. In the paper, besides giving all the details of the proposed solution, we show its benefit with standard digital signature techniques.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.