IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Secure Soap-Based Web Services for Distance Education

Secure Soap-Based Web Services for Distance Education
View Sample PDF
Author(s): K. Komathy (Anna University, India), P. Vivekanandan (Anna University, India)and V. Ramachandran (Anna University, India)
Copyright: 2008
Pages: 16
Source title: Online and Distance Learning: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Lawrence A. Tomei (Robert Morris University, USA)
DOI: 10.4018/978-1-59904-935-9.ch213

Purchase

View Secure Soap-Based Web Services for Distance Education on the publisher's website for pricing and purchasing information.

Abstract

The objective of this paper is to emphasize the need for an effective security model and its implementation for distributed applications. Online web-based education needs to share the resources dynamically, irrespective of the network and platform on which the services are deployed. A communication protocol called Simple Object Access Protocol (SOAP) provides a platform for interoperability, which holds the key for the reuse and integration needed for tomorrow’s sophisticated online learning. The requirements of a diverse population of learners can be met with a flexible system such as SOAP that provides education at anytime from anywhere. SOAP protocol does not include the security of the web transactions it carries and so it is the responsibility of any application to take care of the safety of its critical data being transmitted. This paper attempts to bring out a comprehensive security model based on cryptographic techniques for the distributed web services connected through a SOAP-RPC based communication network to safeguard sensitive information over the wire. The adaptive nature of this proposed security model, not only considers the protection of an entire web transaction, but also customizes the safety of any fragment of the transaction. This paper analyzes a possible and an alternate security mechanism to vendor-dependant technologies as applicable to the distributed services.

Related Content

Sylvia Robertson. © 2023. 28 pages.
Dimitrios Stamovlasis, Charalampos Tsanidis. © 2023. 23 pages.
Ikram Chelliq, Lamya Anoir, Mohamed Erradi, Mohamed Khaldi. © 2023. 26 pages.
Vasiliki Ioakeimidou. © 2023. 27 pages.
Eleni Bonti. © 2023. 25 pages.
Lamya Anoir, Ikram Chelliq, Mohamed Erradi, Mohamed Khaldi. © 2023. 29 pages.
Shibu Puthalath, M. R. Mallaiah, Viswesh Sekhar. © 2023. 17 pages.
Body Bottom