Open Access   Article Go Back

V&V Analysis of Composite Web Service using WS Simulator for Trust Management in WS Lifespan

G. Raj1 , M. Mahajan2 , D. Singh3

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-6 , Page no. 1433-1440, Jun-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i6.14331440

Online published on Jun 30, 2018

Copyright © G. Raj, M. Mahajan, D. Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: G. Raj, M. Mahajan, D. Singh, “V&V Analysis of Composite Web Service using WS Simulator for Trust Management in WS Lifespan,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1433-1440, 2018.

MLA Style Citation: G. Raj, M. Mahajan, D. Singh "V&V Analysis of Composite Web Service using WS Simulator for Trust Management in WS Lifespan." International Journal of Computer Sciences and Engineering 6.6 (2018): 1433-1440.

APA Style Citation: G. Raj, M. Mahajan, D. Singh, (2018). V&V Analysis of Composite Web Service using WS Simulator for Trust Management in WS Lifespan. International Journal of Computer Sciences and Engineering, 6(6), 1433-1440.

BibTex Style Citation:
@article{Raj_2018,
author = {G. Raj, M. Mahajan, D. Singh},
title = {V&V Analysis of Composite Web Service using WS Simulator for Trust Management in WS Lifespan},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {1433-1440},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2364},
doi = {https://doi.org/10.26438/ijcse/v6i6.14331440}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.14331440}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2364
TI - V&V Analysis of Composite Web Service using WS Simulator for Trust Management in WS Lifespan
T2 - International Journal of Computer Sciences and Engineering
AU - G. Raj, M. Mahajan, D. Singh
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 1433-1440
IS - 6
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
565 341 downloads 309 downloads
  
  
           

Abstract

Validation and Verification in Composite web service development process is basic need to provide trust in between developers who are handling this development process using cloud service through different geographical locations. In this research work, V&V process simulated through Web Service Simulator using Asp. Net Web Services controlled by Web application. In continuity, complete demonstration of customers and web service interaction is simulated. This research work answers the questions as How data has been verified and validated so that it does not create any threats for the developers system, How intruder have not access to data without complete authentication. The research is also demonstrates the role based limitation in web service development. Web Services Simulator (WSS) used the concept of SOAP and it monitored and controlled security threats through a web application that are imposed via attackers at several points.

Key-Words / Index Term

Web Services, Composition of Web Services, SOAP , Validation and Verification, WSDL, UDDI, Web security Attacks, Threats Classification

References

[1] M. D. Priya, A. Lavanya, "Intrusion Detection System Using Raspberry Pi Honeypot in Network Security", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4 Issue 3, pp. 41-45, January-February 2018.
[2] E. Manigandan, C. Kalaiarasi, E. Manigandan, Prof. C. Kalaiarasi, "Cryptography in Cloud Computing : A Basic Approach to confirm Security in Cloud", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4 Issue 3, pp. 58-63, January-February 2018.
[3] W. T. Tsai, Y. Chen, R. Paul N. Liao, and H. Huang, “Cooperative and Group Testing in Verification of Dynamic Composite Web Services”, in Workshop on Quality Assurance and Testing of Web-Based Applications, in conjunction with COMPSAC, September 2004, pp.170-173.
[4] Vicente Aguilera Diaz, Robert Auger, Amit Klein, Dennis Groves, Cesar, “MX Injection : Capturing and Exploiting Hidden Mail Servers”, OWASP Spain chapter meeting of June 16th, 2006.
[5] TasosLaskos, “Arachni Framework v1.4 &WebUI v0.5.10”, Web Application Security Scanner, Feb 09 2016,01:04AM,http://www.securityfocus.com/archive/107/537488/30/0/threaded
[6] “Common Vulnerabilities and Exposures, The Standard for Information Security Vulnerability Names”, sponsored by US-CERT at the U.S. Department of Homeland Security. Copyright © 1999–2016, The MITRE Corporation. CVEhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0800
[7] Kumar, Vipin, Srivastava, Jaideep, Lazarevic, Aleksandar, “Managing Cyber threats: Issues, Approaches and Challenges”, Springer Publishers,2005, ISBN 978-0-387-24226-2.
[8] S. K. Singh, “Database systems: Concepts, Design and applications”, Pearson Education India, 2011, ISBN 978-81-317-6092-5.
[9] Web Application Security Consortium.http://www.webappsec.org
[10] Roberto Chinnici, Hugo Haas, Amelia A. Lewis, Jean-Jacques Moreau, David Orchard,SanjivaWeerawarana, “Web Services Description Language (WSDL) Version 2.0 Part 2”: AdjunctsW3C Recommendation 26 June 2007.Copyright © 2007 W3C® (MIT, ERCIM, Keio)
[11] Kung-Kiu Lau and Cuong Tran, “Composite Web Services”, Chapter: Emerging Web Services Technology, Volume II, Part of the series:Whitestein Series in Software Agent Technologies and Autonomic Computing, pp 77-95
[12] DimkaKarastoyanova and Alejandro Buchmann, “Development Life Cycle of Web Service-based Business Processes. Enabling Dynamic Invocation of Web Services at Run Time”, ICSOC’05: The 3rd International Conference On Service Oriented Computing, 2004.
[13] Karthikeyan Bhargavan, Ricardo Corin,CedricFournet,Andrew D. Gordon, “Secure Sessions for Web Services”,ACM Workshop on Secure Web Services, October 29, 2004, Fairfax VA,USA.Copyright 2004 ACM 1-58113-973-X/04/0010
[14] Muhammad Ahtisham Aslam, Jun Shen,Michael Herrmann, “An Integration Life Cycle for Semantic Web Services Composition”,11th International Conference on Computer Supported Cooperative Work in Design, 2007, E-ISBN :1-4244-0963-2, Print ISBN:1-4244-09624 DOI:10.1109/CSCWD.2007.4281485, Page(s):490 – 495.
[15] Zhaohao Sun, Dong Dong, Jun Han, “A Demand Driven Web Service Lifecycle”, New Trends in Information and Service Science, 2009. NISS `09, DOI: 10.1109/NISS.2009.135
[16] Oracle® Application Server Web Services Developer`sGuide, 10g (10.1.3.5.0), Part Number E13982-01
[17] F. Curbera, M. Duftler, R. Khalaf, W. Nagy, N. Mukhi,and S.Weerawarana, “Unraveling the Web Services Web: An Introduction to SOAP, WSDL, and UDDI,” IEEE Internet Computing, vol. 6,no. 2, pp. 86-93, Mar./Apr. 2002
[18] Martin Gudgin, Marc Hadley,Noah Mendelsohn, Jean-Jacques Moreau, Henrik Frystyk Nielsen, Anish Karmarkar, Yves Lafon, “SOAP Version 1.2 Part 1: Messaging Framework (Second Edition)”, W3C Recommendation 27 April 2007.