Synonyms
Authentication; Data confidentiality; Data integrity services
Definition
Given a set of local or distributed resources to be protected, a security service is a task (or set of tasks) that coherently performs processing or communication on behalf of the underlying system infrastructure, in order to support and employ several security requirements of both the system and the data sources. Such requirements involve authentication, PKI accessing, etc. over the underlying resources. Security services typically implement portions of security policies and are implemented via particular processes which are called security mechanisms.
Key Points
Security services are well documented and described in X.800 documentation [1] for almost all the layers from the physical up to the application layer, whereas focus on security services applied on the Web is given in [2]. Physical and data layer security services focus on support confidentiality at various levels, namely, at the connection and...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Recommendation X.800 Security architecture for open systems, interconnection for CCITT applications. http://fag.grm.hia.no/IKT7000/litteratur/paper/x800.pdf
Stoupa K, Vakali A. Policies for web security services, chapter III. In: Ferrari E, Thuraisingham B, editors. Web and information security: Idea Group; 2006.
Faisal M, Al-Muhtadi J, Al-Dhelaan A. Integrated protocols to ensure security services in wireless sensor networks. Int J Distrib Sensor Networks. 2013;9(7):740392.
Kang J, Adibi S. A review of security protocols in mHealth wireless body area networks (WBAN). In: Proceedings of the International Conference on Future Network Systems and Security; 2015. p. 61–83.
Fouad MMM, Hassanien AE. Key pre-distribution techniques for WSN security services, vol. 70. 2014. p. 265–83.
Yeo S-S, Kim S-J, Cho D-E. Dynamic access control model for security client services in smart grid. Int J Distrib Sensor Networks. 2014;10(6):81760. 7 pages
Liang H, Huang D, Cai LX, Shen X, Peng D. Resource allocation for security services in mobile cloud computing. In: Proceedings of the IEEE Conference on Computer Communications Workshops; 2011.
Rosado DG, Fernández-Medina E, López J. Security services architecture for secure mobile grid systems. Spec Issue Secur Dependability Assur Software Archit. 2011;57(3):240–58.
Demchenko Y, De Laat C, Lopez DR, Garcia-Espin JA. Security services lifecycle management in on-demand infrastructure services provisioning. In: Proceedings of the 2nd IEEE International Conference on Cloud Computing Technology and Science; 30 Nov 2010–3 Dec 2010. p. 644, 650.
Shin S, Porras PA, Yegneswaran V, Fong MW, Gu G, Tyson M. FRESCO: modular composable security services for software-defined networks. In: Proceedings of the Network and Distributed Systems Security Symposium; 2013.
Sheng QZ, Qiao X, Vasilakos AV, Szabo C, Bourne S, Xu X. Web services composition: a decade’s overview. Inf Sci. 2014;280(Oct):218–38.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2018 Springer Science+Business Media, LLC, part of Springer Nature
About this entry
Cite this entry
Vakali, A. (2018). Security Services. In: Liu, L., Özsu, M.T. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8265-9_1481
Download citation
DOI: https://doi.org/10.1007/978-1-4614-8265-9_1481
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-8266-6
Online ISBN: 978-1-4614-8265-9
eBook Packages: Computer ScienceReference Module Computer Science and Engineering