Kerberos see [16] LDAP see [17] XCBF see [18]
Parts
» OWS-6 Secure Sensor Web Engineering Report
» Scope OWS-6 Secure Sensor Web Engineering Report
» Future work OWS-6 Secure Sensor Web Engineering Report
» Abbreviated terms UML notation Used parts of other documents Use Case Description
» Sensor Register Sensor FindBind
» Sensor Web Serivces FindBind Processing
» Use Case Architecture Introduction to TCSEC “The Orange Book”
» Definition of Security Requirements based on ISO 10181
» Denial of Service Attacks applicable to OGC Web Services
» Example Attacks applicable to XMPP Servers
» Threat Modeling Techniques The Foundation of Message-Level-Security
» The Services Baseline Communication Patterns applicable to the Baseline
» Sensor Planning Service SPS SPS EO Profile Sensor Observation Service SOS
» Sensor Alert Service SAS Summary
» Vulnerabilities and Attacks for the Baseline Services
» Identify the Assets Identify the Threats for GetCapabilities operation
» Identify the Threats for DescribeTasking operation
» Submit operation Sensor Planning Service
» DescribeResultAccess operation Sensor Planning Service
» GetFeasibility operation Sensor Planning Service
» GetStatus operation Sensor Planning Service
» Update operation Sensor Planning Service
» Cancel operation Sensor Planning Service
» GetCapabilities operation Sensor Observation Service
» DescribeSensor operation GetObservation operation
» RegisterSensor operation Sensor Observation Service
» InsertObservation operation Sensor Observation Service
» GetObservationById operation Sensor Observation Service
» GetResult operation Sensor Observation Service
» GetCapabilities operation Advertise operation
» RenewAdvertisement operation Sensor Alert Service
» CancelAdvertisement operation Subscribe operation
» RenewSubscription operation Sensor Alert Service
» Likelihood to exercise an attack and likelihood of success
» Impact Discussion Risk discussion
» Overall Rating Attack suitability discussion
» IPSec see [2] TLS SSL see [3]
» XML Digital Signature see [7]
» Kerberos see [16] LDAP see [17] XCBF see [18]
» SAML see [10] Standards for Authentication
» XACML see [19], [20], [21], [22] Standards for Authorization Attribute Based Access Control
» XrML see [26] REL Mpeg REL see [27] ODRL see [28]
» WS-Addressing see [31] WS-Policy: see [33] WS-Policy Attachment see [34]
» WS-SecurityPolicy see [35] WS-Trust see [36]
» ISOTS 15000 see [45], [46], [47], [48], [49] Standards for eBusiness
» ISOIEC 15408 see [50], [51], [52] Standards for eBusiness
» ISOIEC 15443 see [53], [54], [55] Standards for Security Techniques
» Authentication Applicable standards to implement the different Requirements
» Access Control Digital Rights Management DRM Confidentiality
» Integrity Non-repudiation Applicable standards to implement the different Requirements
» Notification pattern based communication Firewall and NAT
» Perimeter networks More restrictive solutions
» Use Message Level Security Services shall support SOAP and WS-Security
Show more