A Design Pattern for Event-Based Processing of Security-Enriched SOAP Messages

For Web Services in Cloud Computing contexts, the efficient processing of XML documents is a major topic of interest. Especially for WS-Security-enriched messages, processing performance nowadays tends to become a major issue. Streaming XML processing approaches lead to valuable optimization due to lower resource consumption, but their adoption requires major conceptional changes in the processing application.In this paper, we present a pattern for architectural concepts that employ the SAX-based streaming processing approach. Its major benefit--apart from providing the performance advantage--consists in a convenient, modular architecture that can easily be extended with new modules and new types of events without modification of existing modules.

[1]  Hahn-Ming Lee,et al.  XML Evolution: a two-phase XML processing model using XML prefiltering techniques , 2006, VLDB.

[2]  Nils Gruschka,et al.  SOA and Web Services: New Technologies, New Standards - New Attacks , 2007, ECOWS 2007.

[3]  Nils Gruschka,et al.  WS-SecurityPolicy Decision and Enforcement for Web Service Firewalls , 2006 .

[4]  Ralph Johnson,et al.  design patterns elements of reusable object oriented software , 2019 .

[5]  D. Eastlake,et al.  XML Encryption Syntax and Processing , 2003 .

[6]  Nils Gruschka,et al.  The Impact of Flooding Attacks on Network-based Services , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[7]  Marc Hadley,et al.  Web Services Addressing 1.0 - SOAP Binding , 2005 .

[8]  Gerald Brose A Gateway to Web Services Security - Securing SOAP with Proxies , 2003, ICWS-Europe.

[9]  Nils Gruschka Schutz von Web Services durch erweiterte und effiziente Nachrichtenvalidierung , 2008 .

[10]  Nils Gruschka,et al.  Event-Based SOAP Message Validation for WS-SecurityPolicy-Enriched Web Services , 2006, SWWS.

[11]  Nils Gruschka,et al.  Protecting Web Services from DoS Attacks by SOAP Message Validation , 2006, SEC.

[12]  Nils Gruschka,et al.  A survey of attacks on web services , 2009, Computer Science - Research and Development.

[13]  Paul Watson,et al.  Experiments Towards Adaptation of Concurrent Workflows , 2007, ECOWS 2007.

[14]  Jonathan Robie,et al.  Editors , 2003 .

[15]  Andy Clark,et al.  A stream-based implementation of XML encryption , 2002, XMLSEC '02.

[16]  Giovanni Della-Libera,et al.  Web Services Security Policy Language (WS-SecurityPolicy) , 2002 .

[17]  Phillip Hallam-Baker,et al.  Web services security: soap message security , 2003 .