Security Type Comparison In Service Oriented Architecture Security


Creative Commons License

YEŞİLTEPE M., BOZKURT Ö. Ö.

World Conference on Technology, Innovation and Entrepreneurship, İstanbul, Turkey, 28 - 30 May 2015, pp.1833-1839 identifier

  • Publication Type: Conference Paper / Full Text
  • Doi Number: 10.1016/j.sbspro.2015.06.402
  • City: İstanbul
  • Country: Turkey
  • Page Numbers: pp.1833-1839
  • Yıldız Technical University Affiliated: Yes

Abstract

Nowadays more effort has been spending on combining subsystems to form larger systems such as enterprise information management systems rather than simple database management systems. The security of the enterprise system emerges as a growing problem besides the difficulty of the creation of complex systems. One of the major adversities is the wideness of the system coverage area. Especially the concept of cloud computing introduced the notion of coverage without strict borders. The security of this notion also is a research topic. In this study, the security mechanisms and properties of web services as well as the usage areas are explained.

Nowadays more effort has been spending on combining subsystems to form larger systems such as enterprise information management systems rather than simple database management systems. The security of the enterprise system emerges as a growing problem besides the difficulty of the creation of complex systems. One of the major adversities is the wideness of the system coverage area. Especially the concept of cloud computing introduced the notion of coverage without strict borders. The security of this notion also is a research topic. In this study, the security mechanisms and properties of web services as well as the usage areas are explained. (C) 2015 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).