29 example would be step number=3Connect A to B.step where the name of
the attribute is number and the value is 3.
SOAP , originally defined as Simple Object Access Protocol, is a protocol
specification for exchanging structured information in the implementation of Web Services in computer networks. It relies on Extensible Markup Language XML
for its message format, and usually relies on other Application Layer protocols, most notably Remote Procedure Call RPC and Hypertext Transfer Protocol
HTTP, for message negotiation and transmission. SOAP can form the foundation layer of a web services protocol stack, providing a basic messaging
framework upon which web services can be built. This XML based protocol consists of three parts: an envelope, which defines what is in the message and how
to process it, a set of encoding rules for expressing instances of application- defined data types, and a convention for representing procedure calls and
responses [6].
2.4 Authentication
Authentication derived from the Greek, authentes = author, namely an action to set something or someone is genuine. Proving originality an object is to establish
the place of origin, while to prove the authenticity of a person is with their identity [4].
Authentication in humans depends on several factors:
A. Something the user is
An example is DNA, retina patterns, fingerprints, voice patterns, biometrics, bio-electric signals produced by the body.
30
B. Something the user has
An example is the ID card, security token, software token and cell phone.
C. Something the user know
Examples include passwords, PINs etc. The first problem, prove the authenticity of documents, can be done with
watermarking and digital signature technology. Watermarking can also be used to protect intellectual property, namely by marking the documents or the work of the
makers signature. The second problem is access control. A computer system is expected to can be
used only by that given the right, so that the computer system should be able to detect and reject a user who does not have rights.
Sample access control which Authentication include : ² Using the internet banking system
² controlling the remote computer with internet
2.5 Cryptography
Cryptography derived from the Greek word which consists of Kryptos, which means graft hidden and meaningful writing. Cryptography in general is the
science and art to maintain the confidentiality of news. In addition to these terms as well cryptography is a science that studies mathematical techniques
31 related with aspects of information security such as data confidentiality, validity
of data, integrity bag data, and authentication data. [4] There are four fundamental goals of science cryptography which is the security
aspect:
A. Confidentiality
It is a service used to keep the contents of the information from anyone except the one with the authority or the secret key to unlock
or peel the information that has been encoded.
B. Data Integrity
Associated with the maintenance of the data changes illegally, for maintaining data integrity, the system must have the ability to detect
manipulation of data by parties who are not eligible, including insertion,
removal, and other data into the data. [4]
C. Authentication
Associated with the recognition, either in whole system as well as the information itself, the two parties must communicate with each
other introduced themselves. Information sent through the canal should authenticated authenticity, data content, delivery time, and
others.
D. Non- Repudiation
Efforts to prevent the denial of the transfer or creation of an information by which to send or make
32 The process of randomization or the process being undertaken to secure a
message called plaintext into a hidden message called a cipher text is encrypted encryption. According to ISO 7498-2, terminology opposite
process, to
convert ciphertext
into plaintext,
called de
descriptions decryption. According to ISO 7498-2, more precise terminology for this process is to decipher.
2.6 Encryption