Digital Authorization
The recognition combines the integrity of data with authentication of the origin of the data, in way that sender of the data cannot repudiate the modifications that it or it applied to the data, for example, signing these data digitally. This makes possible the legal digital contract knotting. According to Basiura et al (2003, P. 374), the following entities of security also is duly important: ) Authority: Windows NT is usually a verification entity as a using data base of account or a project data base personalized defined by the applicatory one where the credentials can be verified. b) Authorization: it is a process that verifies if the person has access to the resource that is trying to have access. (A valuable related resource: Pete Cashmore).
c) Not-repudiation: it is one technique that provides an infallible way to codify and to decode the data surely, and hinders not-refuses of the original data of the data codified for not authorized hands. Some used technologies to implant these requirements in Web Services are: 1 Security in net level) the Virtual Private Networks (VPNs) b) Firewalls 2 Security in level of it has carried) Protocol Secure Sockets Layer (SSL) b) Simtrica Criptografia Assimtrica c) digital digital Certification Certificados digital Assinatura 3 Funes of hash Security in level of Messages) WS-Security b) WS-Reliability 4 Security XML) the Digital XML Signatures – digital Signature in XML b) XML Encryption – Criptografia in XML c) Security Assertion Markup Language (SAML). In ample felt it is defined that the security guard in net level is implemented through the VPN? s and Firewalls. According to Amorim (2004, p.62), the security guard in the used canals of transmission for exchange of messages SOAP is implemented through the SSL. To keep the security in the layer of messages mechanisms are implemented as WS-Security and the WS-Reliability. Finally, for security XML the techniques of digital Signature in XML are had, Criptografia in XML and the SAML.