Said Nabi

Work place: Shaheed Zulifikar Ali Bhutto Institute of Science and Technology (SZABIST), Islamabad, Pakistan

E-mail: saidnabi115@gmail.com

Website:

Research Interests: Computer systems and computational processes, Computer Architecture and Organization, Information Security, Network Security, Data Structures and Algorithms, Information-Theoretic Security

Biography

Said Nabi is pursuing for MS in Computing (Software Engineering) at Shaheed Zulfikar Ali Bhutto Institute of Science and Technology (SZABIST), Islamabad, Pakistan. His research interests include Information Security and Service Oriented Architecture.

Author Articles
An Analysis of Application Level Security in Service Oriented Architecture

By Said Nabi M. N. A. Khan

DOI: https://doi.org/10.5815/ijmecs.2014.02.04, Pub. Date: 8 Feb. 2014

In computing, the software elements like objects and components emphasize on reusability using design tools of abstraction and separation of concerns. Software architecture has appeared as an initial idea to develop huge, complicated and heterogeneous distributed systems successfully. Service Oriented Architecture (SOA) combines services together to make systems having a greater impact on the way software systems are developed. SOA addresses the need of standards-based, loosely connected, and distributed computing which is protocol independent. It is not easy to ensure the secure transaction of data, where the movement of data occurs through loosely connected services. A number of techniques have been proposed in the contemporary literature to guide the SOA implementation in distributed system. These techniques offer certain benefits, but pose some challenges alongside such as the use of meta-data as framework and standard, contract documents, security patterns and security adviser, etc. The objective of this research is to provide a comprehensive analysis of various approaches used to provide application level security to the web services in SOA. These approaches have been compared based on a number of parameters. In addition, we critically evaluate different security methods used in SOA. The study also discusses some future directions in this domain.

[...] Read more.
Other Articles