You are on page 1of 11

c    


SOAP MESSAGE EX-CHANGE TECHNIQUE 



By

    


  
      


Guided by


   
    

    

a  
 
 

   







   

 !"
#$%&$'()
      

Certified that Mr./Ms. ________________________, who is

doing the project titled *****************************

under my guidance is regular/average/poor (Strike of which ever

is not applicable) in attendance.



%+,'%$-&./,      0+,'%$-&./,
     


  


This System provides web services security model based on a kind of
guarantee the SOAP message transmission security, the aim is to guarantee
the EAI data information resources will not be tamped between enterprise
system when they are transferring, so it protects the data integrity. In
addition, implements identity authentication and permission Management.
Therefore, improving the interoperability of web services, enhanced web
services application security.

Data encryption ,is not only ensures data security during transmission
from the transport layer, but also ensures the data integrity and
confidentiality at application layer, both service requestor and provider
provide the signature authentication and access control

The survey show that the web service security model solve
deficiencies of traditional way, data issues are effectively solved.

Hence, to ensure more comprehensive & safe EAI system. I am going


to implement few ways to ensure security by introducing a secure exchange
pattern or communication model for SOAP Messaging.

 - Simple Object Access Protocol


1 - Based protocols















  


            




































  


.2&', 3 .2&',$4+.3% $2, 3




































   

$5-, 3 $5-,$4+.3% $2, 3



































  )

   

(i)Ê Give a detailed introduction about your area of work. (Do not give
any introduction about the company in which you do the project.
May be you can indicate in the introduction that you are doing the
project there in a statement or two).
(ii)Ê Proposed Work - Overview of the proposed idea/work highlighting
the methodology(s) and the final outcome.
(iii)Ê Followed by the organization of your report.
  

  c

1)Ê This section is a survey of any related/existing works relevant to your


work.
2)Ê Give references to any paper that you refer to.

e.g. Since the spread of the World Wide Web, medical portals and health
related sites are considered among the most popular tools for accessing and
distributing medical information [1]. Medical sites have reached during the
last years an impressive population, estimated as a 2% of all web sites and
portals found in the Internet. The degree to which these resources are used
by Internet users is similarly high. According toPutatherecent research by
reference in the
Eysenbach and Kohler [2], it was found that that 55% of Internet
reference sectionusers
using have
the
accessed even once the Web to find medical information, while
same numbers 4.5% of total
Internet searches in the popular search engines are related to health
information.

3)Ê Discuss about the issues that exists in the related works.
4)Ê Finally highlight how your work is going to eliminate these issues.
  

    

1)Ê Overall System Architecture


(i) Modules (0 ± level DFD)
(ii) Detailed design for each module (1 ± level DFD, Algorithms,
Sample Inputs
and outputs for each module, etc)
2) Project Deliverables
3) Implementation details
4) Limitations of your project
4) Users of the system
5) Project Schedule
    

3'#3&'%$-$4,'6

[1] Maglogiannis I., Delakouridis K., Kazatzopoulos L., "Enabling


collaborative medical diagnosis over the Internet via peer to peer distribution
of electronic health records", Journal of Medical Systems Vol. 30 ± 2,
pp:107-116, 2006.

3'3%7,',%8,$4,'6

[2] Anagnostopoulos I., Stavropoulos P., Kouzas G., Anagnostopoulos C.,


Vergados D.D, Estimating the evolution of categorized web page
populations, proceeding of the 1st International Workshop on Adaptation
and Evolution in Web Systems Engineering (AEWSE 06), 6th International
Conference of Web Engineering (ICWE 06), Palo Alto, CA, July 10-14,
2006.

3'3396
[3] Author(s) of book, Book title, publisher, edition

3':,54$2,6

[4] URL, latest accessed by (month,year)

 1!

Place the pseudo codes/codes in this section.

You might also like