Replay, transaction insertion, out of order command processing and state modification are all examples of Web Services...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
specific attacks that are opened up as part of a message/transaction driven architecture. Digital signatures, strong identities, sequence numbers, validity periods and encryption are all tools that can be used to mitigate such threats.
Related Q&A from Andrew Nash
Web services security expert Andrew Nash discusses how to guard against SQL injection.continue reading
Web services security expert Andrew Nash discusses SOA and the security of entry points.continue reading
Web services security expert, Andrew Nash, explains the difference between data validation and Web services and Web applications.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.