{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T23:41:40Z","timestamp":1654126900699},"reference-count":27,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4,1]]},"abstract":"<p>The Internet has provided an avenue for businesses to adopt web services. Web services promises scalability, agility, cost reduction, profitability and availability thereby meeting instant gratification needs of web users'. It refers to modular Internet-based business functions that perform specific business tasks to facilitate business interactions within and beyond the organization. While addressing web services benefits there have been discussions on the importance of its security. The security of web services has deeply influenced its development and is also one of the main reasons why web services have not been adopted widely. Therefore, this study aims to examine the impact of web services standards and how it facilitates web services security. We analyze security models in web based technologies from previous studies such as; in cloud computing and security as a service technologies to develop a framework of web services standards and its impact on web services security. We then discuss the theoretical and practical implications of web services security and directions for future research.<\/p>","DOI":"10.4018\/ijwnbt.2014040102","type":"journal-article","created":{"date-parts":[[2014,9,24]],"date-time":"2014-09-24T16:15:48Z","timestamp":1411575348000},"page":"21-39","source":"Crossref","is-referenced-by-count":0,"title":["The Impact of Standards in Web Services Security"],"prefix":"10.4018","volume":"3","author":[{"given":"Pauline","family":"Ratnasingam","sequence":"first","affiliation":[{"name":"School of Accountancy and Computer Information Systems, University of Central Missouri, Warrensburg, MO, USA"}]}],"member":"2432","reference":[{"key":"ijwnbt.2014040102-0","unstructured":"BEA systems, Intalio, SAP, and Sun Microsystems. (2002). Web service choreography interface, 1.0. http:\/\/ftpna2.bea.com\/"},{"issue":"1","key":"ijwnbt.2014040102-1","doi-asserted-by":"crossref","first-page":"38","DOI":"10.5120\/7737-0789","article-title":"Efficient and secure web services by using multi agents.","volume":"50","author":"A.Esfandi","year":"2012","journal-title":"International Journal of Computers and Applications"},{"key":"ijwnbt.2014040102-2","unstructured":"Fiere, J. (2007). SOA security. Master Thesis, Faculty of Science Vrije Universiteit Amsterdam."},{"key":"ijwnbt.2014040102-3","author":"M.Hafner","year":"2009","journal-title":"Security engineering for service-oriented architectures"},{"key":"ijwnbt.2014040102-4","unstructured":"Hagell, J. III, & Brown, J. S. (2001). Your next IT strategy. Havard Business Review, 105-113."},{"key":"ijwnbt.2014040102-5","first-page":"1687","article-title":"Web services in multimedia communication.","author":"M.Hamdi","year":"2012","journal-title":"Advances in Multimedia"},{"key":"ijwnbt.2014040102-6","first-page":"129504","author":"M.Hamdi","year":"2012","journal-title":"Web services in multimedia communication. Advances in Multimedia"},{"key":"ijwnbt.2014040102-7","first-page":"181","article-title":"Using the balanced scorecard to achieve sustained IT alignment: A case study.","volume":"17","author":"Q.Hu","year":"2006","journal-title":"Communications of the Association for Information Systems"},{"key":"ijwnbt.2014040102-8","doi-asserted-by":"publisher","DOI":"10.1109\/IWISA.2010.5473445"},{"key":"ijwnbt.2014040102-9","unstructured":"Jonnaganti, V. (2009). An integrated security model for the management of SOA- Improving the attractiveness of SOA environments through a strong architectural integrity. Master Thesis, University of Gothenburg Department of Applied Information Technology Gothenburg, Sweden."},{"key":"ijwnbt.2014040102-10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.01.003"},{"key":"ijwnbt.2014040102-11","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2011.70"},{"key":"ijwnbt.2014040102-12","unstructured":"Leymann, F., & IBM. (2001). Web service flow language (WSFL 1.0) IBM software group, May 1-108."},{"key":"ijwnbt.2014040102-13","unstructured":"Manes, A. T. (2001). Introduction to web services. Retrieved from http:\/\/www\/w3.org\/TR\/xmlschema-2\/"},{"issue":"60","key":"ijwnbt.2014040102-14","first-page":"50","article-title":"The NIST definition of cloud computing.","volume":"53","author":"P.Mell","year":"2010","journal-title":"Communications of the ACM"},{"key":"ijwnbt.2014040102-15","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMMS.2011.6015833"},{"key":"ijwnbt.2014040102-16","unstructured":"Mougin, P., & Barriolade, C. (2001). Web services, business objects and component models. Orchestra Networks, White Paper."},{"issue":"2","key":"ijwnbt.2014040102-17","first-page":"89","article-title":"Measuring security of web services in the requirement engineering phase.","volume":"1","author":"D.Mougouei","year":"2012","journal-title":"International Journal of Cyber-Security & Digital Forensics"},{"key":"ijwnbt.2014040102-18","doi-asserted-by":"publisher","DOI":"10.3923\/itj.2012.241.247"},{"issue":"10","key":"ijwnbt.2014040102-19","first-page":"24","article-title":"A security model and its strategies for web services.","volume":"36","author":"M.Sabbari","year":"2011","journal-title":"International Journal of Computers and Applications"},{"key":"ijwnbt.2014040102-20","author":"D.Salomon","year":"2006","journal-title":"Foundations of computer security"},{"key":"ijwnbt.2014040102-21","doi-asserted-by":"publisher","DOI":"10.1186\/1869-0238-4-11"},{"issue":"8","key":"ijwnbt.2014040102-22","doi-asserted-by":"crossref","first-page":"33","DOI":"10.5120\/12907-9987","article-title":"Classifying web services based on Qos parameters using extended dataset.","volume":"74","author":"V.Tewari","year":"2013","journal-title":"International Journal of Computers and Applications"},{"key":"ijwnbt.2014040102-23"},{"key":"ijwnbt.2014040102-24","first-page":"1","article-title":"A cross-layer security scheme of web-services-based communications for IEEE 1451 sensor and actuator networks.","author":"J.Wu","year":"2013","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"ijwnbt.2014040102-25","first-page":"875","article-title":"Application development with web services","author":"V. C.Yen","year":"2004","journal-title":"Innovations through information technology"},{"key":"ijwnbt.2014040102-26","doi-asserted-by":"publisher","DOI":"10.1109\/IITSI.2010.8"}],"container-title":["International Journal of Wireless Networks and Broadband Technologies"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=115588","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T23:23:35Z","timestamp":1654125815000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijwnbt.2014040102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2014,4,1]]},"references-count":27,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijwnbt.2014040102","relation":{},"ISSN":["2155-6261","2155-627X"],"issn-type":[{"value":"2155-6261","type":"print"},{"value":"2155-627X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4,1]]}}}