You are previewing Web Services Security Development and Architecture: Theoretical and Practical Issues.
O'Reilly logo
Web Services Security Development and Architecture: Theoretical and Practical Issues

Book Description

Web Services Security Development and Architecture: Theoretical and Practical Issues explores a global approach to methodical development in constructing safety architectures for online systems. Addressing security concerns, this critical mass of the most sought after knowledge bridges the gap between practical and theoretical approaches in the field.

Table of Contents

  1. Copyright
  2. Editorial Advisory Board
  3. Foreword
  4. Preface
    1. GENERAL PICTURE OF SECURITY IN WEB SERVICES: CHALLENGES AND OBJECTIVES
    2. AIMS OF THIS BOOK
    3. ORGANIZATION OF THIS BOOK
      1. Section 1: Web Services Security Engineering
      2. Section 2: Web Services Security Architectures
      3. Section 3: Web Services Security Standards
      4. Section 4: Web Services Security Threats and Countermeasures
  5. Acknowledgment
  6. 1. Web Services Security Engineering
    1. 1. Identification of Vulnerabilities in Web Services Using Model-Based Security
      1. ABSTRACT
      2. INTRODUCTION
        1. Model-Based Security Analysis
          1. Challenges for Computer Security
        2. State of the Art in ModelBased Security
        3. Approaching Model-Based Security
        4. Model-Based Development
        5. Model-Based Security Engineering with UMLsec
        6. Capturing Security Requirements with Use Case Diagrams
        7. Secure Business Processes with Activity Diagrams
        8. Preservation of Sensitivity Levels with Class Diagrams
        9. Security-Critical Message Exchange with Sequence Diagrams
        10. Secure State change with Statechart Diagrams
        11. Assumptions on the Physical Layer with Deployment Diagrams
          1. Code-level Assurance against High Level Security Requirements
          2. Analyzing Security Configurations
          3. Application Examples
          4. Remaining Challenges in Model-Based Security
        12. Model-Based Identification of Vulnerabilities
          1. Sources of Vulnerability Information
        13. Penetration Testing
        14. Source code Analysis
        15. Vulnerability Databases
          1. Identifying Vulnerabilities in Services
        16. Identification before Runtime
        17. Identification at Runtime
        18. Identification after Runtime
      3. DISCUSSION
    2. REFERENCES
      1. ENDNOTES
    3. 2. Security Analysis of Service Oriented Systems: A Methodical Approach and Case Study
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
        1. A Case Study from the Health Care Domain
        2. ProSecO: A Model-Based Approach to Security Analysis
        3. Functional System View
        4. Global Functional Meta-Model
        5. Local Functional Meta Model
        6. Case Study: Example Functional Models
        7. The Security Model
        8. Security Analysis Process
        9. Elaborate Functional Model
          1. Case Study: Creating and Adapting the Functional Models
        10. Define Security Objectives
          1. Case Study: Security Objectives
        11. Identify Dependencies
        12. Case Study: Dependencies
        13. Security Requirements Engineering
          1. Case Study: Security Requirements
        14. Threat and Risk Analysis
          1. Case Study: Threat and Risk Analysis
        15. Security Control Engineering
          1. Case Study: Security Controls
      4. RELATED WORK
      5. CONCLUSION
    4. REFERENCES
  7. 2. Web Services Security Architectures
    1. 3. Ontology-Based Authorization Model for XML Data in Distributed Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
        1. SOA and Web Services
        2. Semantic Web and Ontologies
        3. Authorization Models for Web Data
      4. RESEARCH PROBLEM DESCRIPTION
        1. XML Evolution as Data Interchange Standard
        2. Problem of XML Security Reliance on Syntax
          1. XML-RDF Mapping Problem
          2. RDF Ontology Security Problem
      5. RELATED WORK
        1. XML Security
        2. Semantic Web Security
        3. Semantic Integration
        4. Web Services, Semantics and Security
      6. SYSTEM ARCHITECTURE
        1. Semantically Enhanced XML Data
        2. Specification of an Access Control Model for RDF Ontological Data
        3. Derivation of XML Access Control Policies from RDF Authorizations
        4. Using Our Security Model to Solve the Example Problem
      7. TECHNICAL CONTRIBUTION OF SEMANTIC AWARE AUTHORIZATION MODEL
        1. Semantically Enhanced XML Data
          1. Associations between XML and RDF Data
        2. XML to RDF Mapping Properties
        3. Structure Preserving classes
        4. Specification of an Access control Model for RDF
          1. RDF Database and Security Cover
          2. RDF Security Policy and Protection Objects
          3. RDF Security Policies Database
          4. RDF Querying Engine and Security Monitor
        5. Derivation of XML Access Control Policies from RDF Ontologies
        6. Limitations and issues
      8. FUTURE WORK
      9. CONCLUSION
      10. ACKNOWLEDGMENT
    2. REFERENCES
    3. 4. Secure Service Rating in Federated Software Systems Based on SOA
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
        1. Federated Software Systems and SOA
        2. Security Extensions
        3. Trust Extensions and Quality of Service (QoS) considerations
        4. Related Work
      4. DECENTRALIZED REPUTATION ARCHITECTURE FOR FEDERATED SOA-BASED SOFTWARE SYSTEMS
        1. Architecture Overview
        2. Service Evaluation Protocol (SEP)
          1. Prerequisites and Applied Security Algorithms
          2. Participants and Protocol Elements
          3. Public Key Certificates of the Participants
          4. Structure of an Evaluation
          5. Structure of an Evaluation Summary
          6. Functionality of the Protocol
            1. Creation and Submission of an Evaluation (Rating)
            2. Creation (renewal) of an Evaluation Summary
            3. Request for an Evaluation Summary
        3. Extending the Conventional SOA Paradigm
        4. Prototype
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    4. REFERENCES
    5. 5. Forensics over Web Services: The FWS
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
        1. Basic Paradigm
        2. Composition Paradigm
          1. Design Types
          2. Patterns
          3. Composition Standards and Languages
      4. WEB SERVICE ATTACKS
      5. CHALLENGES IN FORENSICS OF WEB SERVICES
        1. Neutrality
        2. Comprehensiveness
        3. Reliability
      6. OVERVIEW OF FWS
        1. Pair-Wise Evidence Generation
        2. Comprehensive Evidence Generation
      7. A CASE STUDY: THE XSS ATTACK
      8. PROMISES OF FWS
        1. Monitoring Web Services Interactions
        2. Forensics over Web Service Architectures
        3. Revealing Global Composition Instances
        4. Orchestration Process Verification
        5. Choreography Instance Verification
      9. RELATED WORK
      10. FUTURE RESEARCH DIRECTIONS
      11. CONCLUSION
    6. REFERENCES
      1. ADDITIONAL READING
    7. 6. Policy-Based Security Engineering of Service Oriented Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
        1. The SERENITY Model of Secure and Dependable Systems
          1. The SERENITY Semantic Approach for S&D Properties
          2. Identification of S&D Properties
          3. Goals and Architecture of S&D Properties Language
          4. S&D Policy Description
        2. Assurance and Compliance of WS-Oriented Systems to of S&D Policies
          1. Ensuring Compliance of Service-Oriented Systems with Dynamic Selection of Services
      4. CONCLUSION
    8. REFERENCES
    9. 7. Security Policies in Web Services
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. BACKGROUND ON POLICIES IN WEB SERVICES
        1. 2.1 Understanding WS-Policy and its Associated Standards
        2. 2.2 Associating Policies to Web Services
        3. 2.3 Design Time and Run Time Policies
        4. 2.4 Use and Role of Policy in SOA Governance
      4. 3. SECURITY POLICY IN WEB SERVICES
        1. 3.1 Security Issues in Web Services
        2. 3.2 Role of Security Policies in Web Services
        3. 3.3 Demystifying WS – Security Policy
          1. 3.3.1 Security Assertion Model
            1. 3.3.1.1 Security Binding Assertion
          2. 3.3.2 Protection Assertions
            1. 3.3.2.1 Integrity Assertions
            2. 3.3.2.2 Confidentiality Assertions
          3. 3.3.3 Token Assertions
          4. 3.3.4 Supporting Token Assertions
          5. 3.3.5 Protocol Assertions
            1. 3.3.5.1 WSS: SOAP Message Security Options
            2. 3.3.5.2 WS-Trust Assertion
          6. 3.3.2 Policy Subjects
        4. 3.4 Security Policies in General
        5. 3.5 XACML
        6. 3.6 Security in REST Based Services
        7. 3.7 Interoperability Issues
        8. 3.8 Security Policy Infrastructure
          1. 3.8.1 SOA Management
          2. 3.8.2 XML Security Gateways
          3. 3.8.3 Service Registry and Repository
          4. 3.8.4 SOA Identity and Authorization Workflow Management Devices
        9. 3.9 Federated Identity
      5. 4. SOA AND SOA GOVERNANCE
      6. 5. CONCLUSION
    10. REFERENCES
  8. 3. Web Services Security Standards
    1. 8. Web Services Security: Standards and Industrial Practice
      1. ABSTRACT
      2. INTRODUCTION
        1. Service-Oriented Architecture (SOA)
          1. SOA Communication
          2. SOA Architectural Layers
        2. Web Services Security and Standards
        3. Threats
        4. Business Workflow Level
        5. Registry and Description Level
        6. The Communications Level
        7. The Document Storage Level
        8. Secure Systems Development Methodologies
        9. Service-Oriented Architecture (SOA) Model
      3. THE CURRENT STATUS OF WEB SERVICES STANDARDS
        1. XML Specifications
        2. Messaging Specifications
        3. Description and Discovery Specifications
        4. Security Specifications
        5. Reliable Messaging Specifications
        6. Business Process Specifications
        7. Transaction Specifications
        8. Management Specifications
        9. Web Services Security in Commercial Products and Tools
      4. WEB SERVICES SECURITY PRODUCTS
      5. WEB SERVICES SECURITY FEATURES
        1. Patterns Used in SOA
        2. SOA Composition
          1. Interfaces and Contracts
            1. Bridge (Gamma et al., 1994)
            2. Adapter AKA: Wrapper (Gamma et al., 1994)
            3. Abstract Factory (Gamma et al., 1994)
            4. Façade (Gamma et al., 1994)
            5. Wrapper Facade (Schmidt, Stal, Rohnert & Buschmann, 2000)
            6. Container
            7. Interceptor (Schmidt et al., 2000)
            8. Validation, Certification, and Governance of Web Services Security and Reliability
      6. CONCLUSION
      7. ACKNOWLEDGMENT
    2. REFERENCES
    3. 9. Security in Service Oriented Architectures: Standards and Challenges
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. BACKGROUND
        1. 2.1 Web Service Architecture and Terminology
          1. 2.1.1 XML: eXtensible Markup Language
          2. 2.1.2 Simple Object Access Protocol (SOAP)
          3. 2.1.3 Web Services Description Language (WSDL)
          4. 2.1.4 Universal Description Discovery and Integration (UDDI)
          5. 2.1.5 Web Services Inspection Language (WSIL)
        2. 2.2 An Example of a Web Service
        3. 2.3 SOA Security
      4. 3. SOA SECURITY STANDARDS
        1. 3.1 Authentication, Authorization, and Single Sign-On
        2. 3.2 Role and Policy Based Access Control
        3. 3.3 Access Control Mechanisms for SOAs
        4. 3.4 Security Assertion Markup Language and WS-Security
        5. 3.5 eXtensible Access Control Markup Language (XACML)
        6. 3.6 Policy Driven SOA Security
      5. 4. SOA SECURITY: CHALLENGES AND MITIGATION STRATEGIES
        1. 4.1 Service Composition
        2. 4.2 Service Transactions
        3. 4.3 Attacks on SOAP Messages
        4. 4.4 Attacks Leveraging WSDL Vulnerabilities
        5. 4.5 Discussions
      6. 5. FUTURE RESEARCH DIRECTIONS IN SOA SECURITY
      7. 6. CONCLUSION
      8. ACKNOWLEDGMENT
    4. REFERENCES
      1. ADDITIONAL READINGS
  9. 4. Web Services Security Threats and Countermeasures
    1. 10. A Survey of Attacks in the Web Services World
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND OF NETWORK ATTACKS
      4. ATTACKS ON WEB SERVICES
        1. Denial of Service
          1. Oversize Payload
          2. Coercive Parsing
          3. Attack Obfuscation
          4. Flooding Attacks
          5. State Deviation
          6. Instantiation Flooding
        2. Signature Wrapping
        3. XML Injection
        4. WS-Addressing Spoofing
        5. Metadata Spoofing
      5. COUNTERMEASURES
        1. Message Validation
        2. Access Control
        3. Client Puzzles
        4. Signature Wrapping Countermeasures
      6. CONCLUSION
      7. FUTURE WORK
    2. REFERENCES
    3. 11. Threat Modeling: Securing Web 2.0 Based Rich Service Consumers
      1. ABSTRACT
      2. INTRODUCTION
        1. What is Web 2.0?
        2. Evolution of Web 2.0 Based Technologies and Systems
        3. Web 2.0 and Business and Need for Security
      3. BACKGROUND
        1. Social Networking Sites
        2. Syndication / RSS
        3. Widgets
        4. Wikis/Blogs
        5. Rich Internet Applications (RIAs)
        6. Mashups
      4. RESEARCH PROBLEM DESCRIPTION
        1. What is Threat Modeling?
        2. Available Threat Model Approaches
          1. AS/NZS 4360:2004 Risk Management
          2. OCTAVE
          3. Trike
          4. Common Vulnerability Scoring System (CVSS)
          5. Microsoft's Threat Modeling Process
        3. Why Existing Threat Model Approaches are Not Appropriate for Web 2.0 Apps
      5. RELATED WORK
      6. EXISTING ATTACKS IN WEB 2.0
        1. Cross-Site Scripting (XSS)
        2. Cross Site Request Forgery (CSRF)
      7. OUR APPROACH TO THREAT MODELING FOR WEB 2.0 APPLICATIONS
        1. System - Asset
        2. System - Attacker
        3. Asset - Attacker
        4. System-Centric
        5. Asset-Centric
        6. Attacker-Centric
      8. BEST PRACTISES
    4. REFERENCES
  10. 5. Selected Readings
    1. 12. Obtaining Security Requirements for a Mobile Grid System
      1. ABSTRACT
      2. INTRODUCTION
      3. SECURITY REQUIREMENTS AND ATTACKS ON A MOBILE GRID SYSTEM
        1. Defining Security Requirements
        2. Defining Attacks on Grid Environments
      4. OVERVIEW OF OUR METHODOLOGY
        1. Methodology of Development
        2. Secure Mobile Grid System Analysis Stage
        3. Activity 3: Definition of Mobile Grid Security Use Cases (MGSUC)
      5. CASE STUDY
          1. Task 3.1: Identify Security Assets
          2. Task 3.2: Identify Threats, Attacks and Risks
          3. Task 3.3: Build Security Case Use and Misuse
          4. Task 3.4: Assessment of Security
      6. CONCLUSION
      7. ACKNOWLEDGMENT
    2. REFERENCES
    3. 13. An MDA Compliant Approach for Designing Secure Data Warehouses
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
        1. Multidimensional Modeling
        2. Security Integration into the Design Process
        3. Access Control Models
        4. Security and Access Control Models for Data Warehouses
      4. AN MDA AND MDS COMPLIANT APPROACH
      5. CONCLUSION
    4. REFERENCES
      1. KEY TERMS
    5. 14. IPSec Overhead in Dual Stack IPv4/IPv6 Transition Mechanisms:An Analytical Study
      1. ABSTRACT
      2. INTRODUCTION AND BACKGROUND
      3. EXPERIMENTAL DETAILS
        1. Frame overhead
        2. Round-Trip Time
        3. Download Time
      4. APPLICATIONS/PROTOCOLS TESTED
        1. ICMP
        2. HTTP
        3. FTP
        4. TFTP
      5. FRAME STRUCTURE
        1. IPv4
        2. IPv6
        3. IPSec Transform Sets
        4. Test Considerations
      6. RESULTS AND DISCUSSION
        1. Frame Overhead Tests on ICMP
        2. IPSec Overhead Tests on IPv4
        3. IPSec Overhead on IPv6
        4. Round-Trip Time Tests on ICMP
        5. Frame Overhead Tests on HTTP
        6. Download Time Tests on HTTP
        7. Frame Overhead Tests on FTP
        8. Download Times Tests on FTP
        9. Frame Overhead Tests On TFTP
      7. CONCLUSION
    6. REFERENCES
    7. 15. An Approach for Intentional Modeling of Web Services Security Risk Assessment
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. CORAS
        1. SecureUML
        2. Tropos
      5. INTENTIONAL MODELING
        1. Issues of Traditional Conceptual Modeling Techniques
        2. Case Study
          1. Recommendation: The Intentional Modeling Approach
      6. CONCLUSION AND FUTURE TRENDS
      7. ACKNOWLEDGMENT
    8. REFERENCES
  11. Compilation of References
  12. About the Contributors