Replay, transaction insertion, out of order command processing and state modification are all examples of Web Services...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
specific attacks that are opened up as part of a message/transaction driven architecture. Digital signatures, strong identities, sequence numbers, validity periods and encryption are all tools that can be used to mitigate such threats.
Dig Deeper on Securing services
Related Q&A from Andrew Nash
Web services security expert Andrew Nash discusses how to guard against SQL injection.continue reading
Web services security expert Andrew Nash discusses SOA and the security of entry points.continue reading
Web services security expert, Andrew Nash, explains the difference between data validation and Web services and Web applications.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.