New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 981
Comments: 19
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image prot: Security HeadLines: The challenges for Security image
Protocols

The challenges for security were most clearly echoed by members of the business community, including representatives from Lexis-Nexis representing the publishing industry, Boeing, representing the Manufacturing Industry, Niteo, representing the financial industry, and a representative from the federal government. These industry representatives discussed actual Web services security challenges that are being encountered in their respective industries; including interoperability, lack of sufficiently detailed specifications, overlap and redundancy among specifications, and a high total-cost-of-implementation. In fact they didn't stop with security. Everyone talked about how difficult it was to get funding for new projects that don't have a very clear ROI in this tight economy. What was enlightening from these discussions was how similar their problems and requirements seemed to be. On the whole, these representatives thought that the Security specifications were moving in the right direction and addressing the right problems, but that they still had a way to go to be practically applicable.


The security session continued with presenters from diverse parts of the industry talking on a dizzying array of security-related specifications. Joseph Reagle from the W3C presented on the status and design of XML Signature (http://www.w3.org/Signature/) and XML Encryption (http://www.w3.org/Encryption/2001/), both of which are key foundational technologies for most higher-level Web services security standards. Kelvin Lawrence from IBM and Chris Kaler from Microsoft presented the WS-Security specification that has been recently submitted to OASIS, including discussions of the foundational technologies for the specification, like: token-based authentication protocols like X509, Kerberos, and SAML; XML Encryption and XML Signature; and new SOAP extensions to support security, such the Security header, UserNameToken, SecurityTokenReference, and BinarySecurityToken elements. Prateek Mishra, from Netegrity, gave an introductory talk on SAML, the authentication and authorization technology set that the Liberty Alliance uses, as well as briefly touching on the SPML (Service Provisioning Markup Language) and XCBF (Common Biometric Format) specifications. For those of us interested in how the WS- Security specification will work with existing authentication protocols, the WS-Security Profile of the Security Assertion Markup Language (SAML), that can be found at http://www.oasis-open.org/committees/security/#documents will prove to be an interesting read.

It's all a matter of trust

The security session saw a lively speaker from Harvard, Scott Bradner, representing the venerable Internet Engineering Task Force (IETF), who gave a refreshingly frank talk on the problems the IETF is having with coming up with good security standards. He addressed the group's reluctance to embrace the need for good security standards for web services in the coming year or so and the problems of distributing trusted keys, namely who could possible distribute enough keys to make the internet secure, and which group would be trusted enough to be such a distributor? He also addressed the fact that although the government and big companies may want better solutions for security, there is a general feeling that users don't care that much about security, especially not enough to pay for security services.

In his experience, security solutions need to be practical, and a lot of times, the folks in charge of security standards tend to be idealistic. Therefore, the compromise is usually insufficient security. "Right now," said Bradner, "it's an exception when good security happens, not the rule." Dr. Hallam-Baker, the veteran of the security industry, while speaking on in XML Key Management specification (XKMS) shared a poignant insight that "security is about risk control, not risk elimination." This is a great thing to keep in mind when you are developing Web services.

Know your rights

The conference saw Hal Lockhard, of Entegrity Solutions, talking about XACML (http://www.oasis-open.org/committees/xacml/) and Rights Language (XrML) (http://www.xrml.org/). Both standards deal with authorization and authentication, share many core concepts, and specify XML schemas. However, some attendees worried openly about there being too much overlap between these two standards and their not being thought through well enough, which may cause problems in the long run.

Full article and source:

WebServices.org

Posted on Wednesday, 04 September 2002 @ 10:00:00 EDT by Paul
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· IBM
· PHP HomePage
· Microsoft
· Themes.org
· HotScripts
· W3 Consortium
· TCP/IP Protocol Suite
· More about Protocols
· News by Paul


Most read story about Protocols:
Free Online Port Scanning Utilities

image
Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register