Cover image for Security for service oriented architectures
Title:
Security for service oriented architectures
Personal Author:
Publication Information:
Boca Raton : CRC Press, 2014
Physical Description:
xii, 329 pages ; 24 cm.
ISBN:
9781466584020
Abstract:
"Providing a comprehensive guide to security for web services and SOA, this book covers in detail all recent standards that address web service security, including XML Encryption, XML Signature, WS-Security, and WS-SecureConversation. It also reviews recent research on access control for simple and conversation-based web services, advanced digital identity management techniques, and access control for web-based workflows. With illustrative examples and analyses of critical issues, the book is a solid reference on web service standards, a practical overview for researchers looking for innovative new directions,and a suitable textbook on advanced topics in computer and system security"--provided by publisher

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010340802 TK5105.5828 W55 2014 Open Access Book Book
Searching...

On Order

Summary

Summary

Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two.

Supplying authoritative guidance on how to design distributed and resilient applications, the book provides an overview of the various standards that service oriented and distributed applications leverage, including SOAP, HTML 5, SAML, XML Encryption, XML Signature, WS-Security, and WS-SecureConversation. It examines emerging issues of privacy and discusses how to design applications within a secure context to facilitate the understanding of these technologies you need to make intelligent decisions regarding their design.

This complete guide to security for web services and SOA considers the malicious user story of the abuses and attacks against applications as examples of how design flaws and oversights have subverted the goals of providing resilient business functionality. It reviews recent research on access control for simple and conversation-based web services, advanced digital identity management techniques, and access control for web-based workflows.

Filled with illustrative examples and analyses of critical issues, this book provides both security and software architects with a bridge between software and service-oriented architectures and security architectures, with the goal of providing a means to develop software architectures that leverage security architectures.

It is also a reliable source of reference on Web services standards. Coverage includes the four types of architectures, implementing and securing SOA, Web 2.0, other SOA platforms, auditing SOAs, and defending and detecting attacks.


Author Notes

Walt Williams, CISSP®, SSCP®, CEH, CPT has served as an infrastructure and security architect at firms as diverse as GTE Internetworking, State Street Corp, Teradyne, The Commerce Group, and EMC. He has since moved to security management, where he now manages security at Lattice Engines. He is an outspoken proponent of design before build, an advocate of frameworks and standards, and has spoken at Security B-Sides on risk management as the cornerstone of a security architecture.

Mr. Williams' articles on security and service oriented architecture have appeared in the Information Security Management Handbook . He sits on the board of directors for the New England ISSA chapter and is a member of the program committee for Metricon. He has a master's degree in anthropology from Hunter College.


Table of Contents

Prefacep. ix
In Gratitudep. xi
Chapter 1 Introductionp. 1
Chapter 2 Four Kinds of Architecturesp. 3
2.1 Architecturep. 3
2.2 Infrastructurep. 4
2.3 Software Architecturesp. 9
2.3.1 Key Principlesp. 10
2.3.2 Presentation Layerp. 13
2.3.3 Business Layerp. 15
2.3.4 Data Layerp. 16
2.3.5 Workflowp. 19
2.3.6 Communications and Messagingp. 20
2.3.7 Service Layerp. 21
2.4 Service-Oriented Architecturep. 22
2.4.1 Distributed Computing and Servicesp. 23
2.4.2 Process-Oriented SOAp. 25
2.4.3 Web Services or an Externally Focused SOAp. 27
2.4.4 Enterprise Service Busp. 30
2.5 Security Architecturep. 30
2.5.1 Construction of a Security Architecturep. 33
2.5.2 Risk Managementp. 34
2.5.3 Organization and Managementp. 36
2.5.4 Third Partiesp. 37
2.5.5 Asset Managementp. 38
2.5.6 Information Classificationp. 39
2.5.7 Identity Managementp. 41
2.5.8 Security Awareness and Trainingp. 44
2.5.9 Physical Securityp. 44
2.5.10 Communications and Operations Managementp. 45
2.5.11 Perimeters and Partitioningp. 46
2.5.12 Access Controlp. 48
2.5.13 Authenticationp. 48
2.5.14 Authorizationp. 50
2.5.15 Separation of Dutiesp. 51
2.5.16 Principles of Least Privilege and Least Authorityp. 51
2.5.17 Systems Acquisition, Development, and Maintenancep. 52
2.5.18 Confidentiality Modelsp. 52
2.5.18.1 Lattice Modelsp. 52
2.5.19 Nonrepudiationp. 53
2.5.20 Integrity Modelsp. 53
2.5.21 Service Clark-Wilson Integrity Modelp. 54
2.5.22 Security Assessments and Auditsp. 58
2.5.23 Incident Managementp. 58
2.5.24 Business Continuityp. 59
2.5.25 Compliancep. 60
2.6 Data Architecturesp. 61
Chapter 3 Implementing and Securing Soap. 65
3.1 Web Servicesp. 65
3.2 Extensible Markup Languagep. 66
3.2.1 Signing XMLp. 68
3.2.1.1 XML Digital Signaturep. 68
3.2.2 XML Encryptionp. 74
3.2.3 Key Managementp. 79
3.2.3.1 Key Informationp. 79
3.2.3.2 Locationp. 79
3.2.3.3 Validationp. 80
3.2.3.4 Bindingp. 80
3.2.3.5 Key Registrationp. 80
3.2.4 XML and Databasesp. 82
3.2.4.1 A Database Query Language for XMLp. 82
3.2.4.2 XML Databasesp. 83
3.2.5 UDDIp. 83
3.2.6 WSDLp. 84
3.3 SOAPp. 87
3.3.1 SOAP Roles and Nodesp. 89
3.3.2 SOAP Header Blocksp. 90
3.3.3 SOAP Faultp. 90
3.3.4 SOAP Data Modelp. 91
3.3.5 SOAP Encodingp. 91
3.3.6 Bindingsp. 92
3.3.7 Documents and RPCp. 93
3.3.8 Messagingp. 95
3.4 WS-Securityp. 99
3.4.1 WS-Trustp. 107
3.4.2 WS-Policyp. 116
3.4.3 WS-SecureConversationp. 129
3.4.4 WS-Privacy and the P3P Frameworkp. 133
3.4.4.1 POLICIESp. 135
3.4.5 WS-Federationp. 144
3.4.5.1 Pseudonymsp. 153
3.4.5.2 Authorizationp. 162
3.4.6 Authorization without WS-Federationp. 173
3.4.7 WS-Addressingp. 178
3.4.8 WS-Reliable Messagingp. 183
3.4.9 WS-Coordinationp. 191
3.4.10 WS-Transactionp. 193
3.5 SAMLp. 195
3.5.1 Assertionsp. 197
3.5.2 Protocolp. 205
3.5.2.1 Assertion Query and Request Protocolp. 207
3.5.2.2 Authentication Request Protocolp. 209
3.5.2.3 Artifact Resolution Protocolp. 212
3.5.2.4 Name Identifier Management Protocolp. 212
3.5.2.5 Single-Logout Protocolp. 213
3.5.2.6 Name Identifier Mapping Protocolp. 214
3.5.3 Authentication Contextp. 214
3.5.4 Bindingsp. 218
3.5.5 Profilesp. 226
3.5.6 Metadatap. 229
3.5.7 Versionsp. 240
3.5.8 Security and Privacy Considerationsp. 241
3.6 Kerberosp. 244
3.7 x509v3 Certificatesp. 246
3.8 OpenIDp. 246
Chapter 4 Web 2.0p. 249
4.1 HTTPp. 249
4.2 RESTp. 250
4.3 WebSocketsp. 251
Chapter 5 Other Soa Platformsp. 253
5.1 DCOMp. 253
5.2 CORBAp. 253
5.3 DDSp. 254
5.4 WCFp. 255
5.5 .Net Passport, Windows LiveIDp. 256
5.6 WS-BPELp. 257
Chapter 6 Auditing Service-Oriented Architecturesp. 271
6.1 Penetration Testingp. 272
6.1.1 Reconnaissancep. 272
6.1.2 Injection Attacksp. 277
6.1.3 Attacking Authenticationp. 278
6.1.4 Attacking Authorizationp. 284
6.1.5 Denial-of-Service Attacksp. 286
6.1.6 Data Integrityp. 286
6.1.7 Malicious Use of Service or Logic Attacksp. 288
6.1.8 Poisoning XML Schemasp. 289
Chapter 7 Defending and Detecting Attacksp. 291
7.1 SSL/TLSp. 291
7.2 Firewalls, IDS, and IPSp. 294
Chapter 8 Architecturep. 297
8.1 Example 1p. 297
8.2 Example 2p. 300
8.3 Example 3p. 305
8.4 Example 4p. 307
Bibliographyp. 317
Indexp. 323