KRISHI
ICAR RESEARCH DATA REPOSITORY FOR KNOWLEDGE MANAGEMENT
(An Institutional Publication and Data Inventory Repository)
"Not Available": Please do not remove the default option "Not Available" for the fields where metadata information is not available
"1001-01-01": Date not available or not applicable for filling metadata infromation
"1001-01-01": Date not available or not applicable for filling metadata infromation
Please use this identifier to cite or link to this item:
http://krishi.icar.gov.in/jspui/handle/123456789/6278
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | N. Arora | en_US |
dc.contributor.author | S. Kolhe | en_US |
dc.contributor.author | S. Tanwani | en_US |
dc.date.accessioned | 2018-07-21T10:58:49Z | - |
dc.date.available | 2018-07-21T10:58:49Z | - |
dc.date.issued | 2016-01-01 | - |
dc.identifier.citation | Not Available | en_US |
dc.identifier.issn | Not Available | - |
dc.identifier.uri | http://krishi.icar.gov.in/jspui/handle/123456789/6278 | - |
dc.description | Not Available | en_US |
dc.description.abstract | Web Services are widely adapted for integrating heterogeneous information systems in a cost-efficient way. Simple Object Access Protocol (SOAP) messages are standard way to exchange the information between web services. Web Services Security (WS-Security) specification is used to secure SOAP messages but adds significant overhead on SOAP message processing. It increases the size of the message on the wire. Also web services are vulnerable to several attacks. Processing efficiency and robustness against certain attacks are important issues of web services security. Schema validation and Hardening are the promising methods to prevent web services from such attacks but have performance bottleneck. A new Parallel Stream based Security Processing model has been developed in order to enhance the performance of WS-Security processing and to secure web services from several attacks. A new methodology is described in the paper in which large SOAP messages are partitioned into schema valid parts. Individual parts are distributed to parallel instances of security processors running on multiple cores in order to reduce the processing load. Experiments are conducted on different sizes of SOAP messages, various security patterns and respective processing time for each is analyzed. Analysis of results reveals that the new parallel stream based security processing model has shown significant improvement in performance as compared to the serial processing. | en_US |
dc.description.sponsorship | Not Available | en_US |
dc.language.iso | English | en_US |
dc.publisher | Not Available | en_US |
dc.relation.ispartofseries | Not Available; | - |
dc.subject | Network Security | en_US |
dc.subject | Web Services | en_US |
dc.title | Parallel Stream Based Processing Model for WS-Security | en_US |
dc.title.alternative | Not Available | en_US |
dc.type | Research Paper | en_US |
dc.publication.projectcode | Not Available | en_US |
dc.publication.journalname | International Journal of Innovative Res in Electrical, Electronics, Instrumentation & Control Engg | en_US |
dc.publication.volumeno | 4(1) | en_US |
dc.publication.pagenumber | 42-46 | en_US |
dc.publication.divisionUnit | Not Available | en_US |
dc.publication.sourceUrl | 10.17148/IJIREEICE.2016.4111 | en_US |
dc.publication.authorAffiliation | ICAR::Directorate of Soybean Research | en_US |
dc.ICARdataUseLicence | http://krishi.icar.gov.in/PDF/ICAR_Data_Use_Licence.pdf | en_US |
dc.publication.naasrating | Not Available | en_US |
Appears in Collections: | CS-DSBR-Publication |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
IJIREEICE 11.pdf | 433.07 kB | Adobe PDF | View/Open |
Items in KRISHI are protected by copyright, with all rights reserved, unless otherwise indicated.