Isi Artikel Utama

Satya Bhushan Verma
Goel Institute of Technology & Management Lucknow India
India
Biography
Shashi Bhushan Verma
Tech Mahindra Limited, Pune, India
India
Vol. 9 No. 3 (2020), Articles, pages 105-117
DOI: https://doi.org/10.14201/ADCAIJ202093105117
How to Cite

Abstract

In the world of computation, the encryption is a technique by which the plaintext or any type of data which is converted from the readable form is transformed into an encoded form. That encoded form can only be read by another entity if they have corrected key for decryption. The proposed technique providing the security to the data in inefficient way that can be further use in implementation in new upcoming task and enhancement in current running projects of SOA (Service Oriented Architecture) BPEL (Business Process Execution Language).

Downloads

Download data is not yet available.

Rincian Artikel

References

A handbook (2020), A Hands-on Introduction to BPEL, Retrieved from 18/06/2020 https://www.oracle.com/technetwork/articles/matjaz-bpel1-090575.html

AES (2020), Advanced Encryption Standard (AES) Retrieved from 18/06/2020 https://searchsecurity.techtarget.com/definition/Advanced-Encryption-Standard.

Bo Zhou et al. 2017, Bo Zhou, Quan Zhang, Qi Shi, Qiang Yang, 2017, Measuring web service security in the era of Internet of Things, Computers and Electrical Engineering.

Deven Shah et al. 2008, Deven Shah, Dr. Dhiren Patel, Dynamic and Ubiquitous Security Architecture for Global SOA, 2008, The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, IEEE, DOI 10.1109/UBICOMM.2008.68

Giorgia Gazzarataa et al. 2015, Giorgia Gazzarataa, Roberta Gazzarataa, Mauro Giacominia, A standardized SOA based solution to guarantee the secure access to EHR, International Conference on Project Management / Conference on Health and Social Care Information Systems and Technologies, Procedia Computer Science 641124 – 1129.

Hariharan et al. 2014, Hariharan, Chitra Babu, Security Testing of Orchestrated Business Processes in SOA, International Conference on Advanced Communication Control and Computing Technologies (lCACCCT), IEEE.

Hua Yue et al. 2012, Hua Yue, Xu Tao, Web Services Security Problem in Service-oriented Architecture, International Conference on Applied Physics and Industrial Engineering.

Liao, Ziqi & Shi, Xinping, 2017, Web functionality, web content, information security, and online tourism service continuance. Journal of Retailing and Consumer Services. 39. 258-263.

Java Cryptography 2020, Retrieved from 18/06/2020 Java Cryptography http://tutorials.jenkov.com/java-cryptography/index.html

Java Symmetric AES 2020, Java Symmetric AES Encryption Decryption using JCE, Retrieved from 18/06/2020 https://javapapers.com/java/java-symmetric-aes-encryption-decryption-using-jce/

Oldooz Karimi et al. 2011, Oldooz Karimi, Security Model For Service-Oriented Architecture, Advanced Computing: An International Journal ( ACIJ ), Vol.2, No.4.

Martin Keen, et al. 2004, Martin Keen, Amit Acharya, Susan Bishop, Alan Hopkins, Sven Milinski, Patterns: Implementing an SOA Using an Enterprise Service Bus, IBM Redbooks, 2004.

M. Tian, et al. 2014, M. Tian, Y. Feng, X. Jin and Y. Zhao, “A security model of command and control system based on SOA,” 2014 IEEE 5th International Conference on Software Engineering and Service Science, Beijing, pp. 784-787.

Michele Bugliesi, et al. 2016, Michele Bugliesi, StefanoCalzavara, RiccardoFocardi, Formal methods for web security, Journal of Logical and Algebraic Methods in Programming, pp-2352-2208 http://dx.doi.org/10.1016/j.jlamp.2016.08.006

Cryptography 2020, What Is Cryptography? By Jorn van Zwanenburg, Retrieved from 18/06/2020 https://www.investinblockchain.com/what-is-cryptography/

Zhengan Huang et al. 2018, Zhengan Huang, Junzuo Lai, Wenbin Chen, Tong Li, Yang Xiang, Data Security against Receiver Corruptions: SOA Security for Receivers from Simulatable DEMs, Information Sciences (2018), doi: https://doi.org/10.1016/j.ins.2018.08.059