• Feb 07, 2023 News!JACN will adopt Article-by-Article Work Flow. The benefit of article-by-article workflow is that a delay with one article may not delay the entire issue. Once a paper steps into production, it will be published online soon.   [Click]
  • May 30, 2022 News!JACN Vol.10, No.1 has been published with online version.   [Click]
  • Dec 24, 2021 News!Volume 9 No 1 has been indexed by EI (inspec)!   [Click]
General Information
    • ISSN: 1793-8244 (Print)
    • Abbreviated Title:  J. Adv. Comput. Netw.
    • Frequency: Semiyearly
    • DOI: 10.18178/JACN
    • Editor-in-Chief: Professor Haklin Kimm
    • Executive Editor: Ms. Cherry Chan
    • Abstracting/ Indexing: EBSCO, ProQuest, and Google Scholar.
    • E-mail: jacn@ejournal.net
Professor Haklin Kimm
East Stroudsburg University, USA
I'm happy to take on the position of editor in chief of JACN. We encourage authors to submit papers on all aspects of computer networks.

JACN 2014 Vol.2(1): 76-84 ISSN: 1793-8244
DOI: 10.7763/JACN.2014.V2.86

Design of Application Layer Services for Security Automation via a Web Service Approach

Kai-Cheong Hee and Chiung Ching Ho

Abstract—N-tier application design has become very common in the IT industry. Each individual layer, such as the application and data layer has its own main functionality. This design is very helpful in securing the application from unauthorized access and in protecting it from attacks to the data layer. The data layer is the core of a company's business, as all the important information of the company will be stored in the data layer and normally will be located in a secured offline server with limited local network access. The application layer acts as the medium to exchange data between the client layer and the data layer over a network. As such, the application layer has been increasingly targeted for intrusion and attacks. This paper will introduce a method to minimize the security risks in the n-tier application design. The method introduced in this paper will mainly focus on how to secure the application layer from various attacks such as Denial of Services (DoS) attack and spoofing attacks. This is achieved through data protection such as random encryption key generation, data encryption etc. and so forth at both the client application and the application layer. 

Index Terms—Automation, security, web services, encrypted security token.

The authors are with the Faculty of Computing and Informatics, Multimedia University, Persiaran Multimedia, 63100 Cyberjaya, Selangor, Malaysia (e-mail: ccho@mmu.edu.my , alwayshee@gmail.com).


Cite:Kai-Cheong Hee and Chiung Ching Ho, "Design of Application Layer Services for Security Automation via a Web Service Approach," Journal of Advances in Computer Networks vol. 2, no. 1, pp. 76-84, 2014.

Copyright © 2008-2024. Journal of Advances in Computer Networks.  All rights reserved.
E-mail: jacn@ejournal.net