Security Type Comparison In Service Oriented Architecture Security


Creative Commons License

YEŞİLTEPE M., BOZKURT Ö. Ö.

World Conference on Technology, Innovation and Entrepreneurship, İstanbul, Türkiye, 28 - 30 Mayıs 2015, ss.1833-1839 identifier

  • Yayın Türü: Bildiri / Tam Metin Bildiri
  • Doi Numarası: 10.1016/j.sbspro.2015.06.402
  • Basıldığı Şehir: İstanbul
  • Basıldığı Ülke: Türkiye
  • Sayfa Sayıları: ss.1833-1839
  • Yıldız Teknik Üniversitesi Adresli: Evet

Özet

Nowadays more effort has been spending on combining subsystems to form larger systems such as enterprise information management systems rather than simple database management systems. The security of the enterprise system emerges as a growing problem besides the difficulty of the creation of complex systems. One of the major adversities is the wideness of the system coverage area. Especially the concept of cloud computing introduced the notion of coverage without strict borders. The security of this notion also is a research topic. In this study, the security mechanisms and properties of web services as well as the usage areas are explained. (C) 2015 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

Nowadays more effort has been spending on combining subsystems to form larger systems such as enterprise information management systems rather than simple database management systems. The security of the enterprise system emerges as a growing problem besides the difficulty of the creation of complex systems. One of the major adversities is the wideness of the system coverage area. Especially the concept of cloud computing introduced the notion of coverage without strict borders. The security of this notion also is a research topic. In this study, the security mechanisms and properties of web services as well as the usage areas are explained.