基于IIFA 算法的SOA 安全模型
作者:

SOA Security Model Design Based on IIFA Algorithm
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [18]
  • |
  • 相似文献 [20]
  • | | |
  • 文章评论
    摘要:

    针对SOAP 消息传输过程中可能引发安全威胁,运用关联规则对SOAP 消息进行挖掘,建立IIFA-SOA安全模型。基于系统实时性要求,采用索引生成频繁集算法(IIFA)进行关联规则的挖掘。实例表明,所建立的IIFA-SOA 安全模型,可以进行安全威胁的预测与销毁,提高了系统的安全性。

    Abstract:

    Abstract:For the SOAP message transmission process may lead to security threats. In this paper we address to mine SOAP messages using association rules, and establish IIFA-SOA security model. Based on the requirements of system real-time, we introduce Index Induce Frequent algorithm for frequent itemsets mining association rules. Experimental results show that the IIFA-SOA security model can make the prediction and elimination of security threats, accordingly improve system security.

    参考文献
    1 Igor Sedukhin. End-to-End Security for Web Services and Services Oriented Architectures, White Paper, March 2003.
    2 WS-SecurityPolicyV1.0,http://www.oasisopen.org/committees/download.php/15979/oasis-wssx-wssecuritypolicy-1.0.pdf.
    3 Gunnar Peterson. Service Oriented Security Architecture. Information Security Bulletin, Nov. 2005,10:325-330.
    4 ThomasErl. Service-Oriented Architecture–Concepts and Design. Pearson Education, Inc, 2005.
    5 Oracle SOA Suite Developer’s Guide. http://www.oracle.com/lang/business_intelligence/data-mining.html.
    6 WS-Policyv1.2, http://www.w3.org/Submission/WS-Policy/
    7 WS-Authorization, http://www.ws-standards.com/ws-security.asp.
    8 WS-Federation,ftp://www6.software.ibm.com/software/per/lib/develorary/wsfed.pdf.
    9 Han JW, Micheline Kamber.数据挖掘概念与技术,机械工出版社, 2007.146-181.
    10 Web Service Security SOAP Messages with Attachments Profile..http://www.oasisopen.org/committees/download.php/10902/wss-swaprofile-1.0-&e=7152.
    11 Chamberlin D, Florescu D, Robie J. Xuery 1.0: An XML Query Language.W3C Working Draft, 2001:35-40.
    12 Mohammad Ashiqur Rahaman, Maarten Rits, Andreas Schaad. An Inline Approach for Secure SOAP Requests and Early Validation. OWASP Europe Conference, 2006.
    13 Huang Y, Kumaran S, Chung J. A service management framework for service-oriented enterprises. Proc. of the IEEE International Conference on E-Commerce Techonlogy. Beijing, China, 2004. 181-186.
    14 Douglas R. Stinson, Journal of Combinatorial Design, 密学原理实践.电子工业出版社, 2008.1.3.
    15 Hany F, Yamany EL, Miriam AM. Capretz Use of Data Mining to Enhance Security for SOA 2008 IEEE. [doi: 10. 1109/ICCIT. 2008.173]
    16 Agrawal R, Srikant R. Fast algorithms for mining association rules. Proc. of VLDB94, 1994(9):487-499.
    17 朱彦霞,张雪萍,王家耀.改进的频繁项集挖掘算法.计算工程与应用, 2009,45(4):143.
    18 李洪奇,武装.基于SOA 的企业应用集成.微型计算机, 2010.1-3.
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

蔡亮,王兵,李辉.基于IIFA 算法的SOA 安全模型.计算机系统应用,2011,20(1):70-74

复制
分享
文章指标
  • 点击次数:1778
  • 下载次数: 3905
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2010-04-20
  • 最后修改日期:2010-05-22
文章二维码
您是第12478472位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京海淀区中关村南四街4号 中科院软件园区 7号楼305房间,邮政编码:100190
电话:010-62661041 传真: Email:csa (a) iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号