These restrictions tend to fall away in the Cloud
Computing scenario. As the Cloud system itself has
some kind of WSDL repository functionality (comparable
to a UDDI registry [21]), new users most
assumably will gather for a service’s WSDL file more
dynamically. Thus, the potential spread of the malicious
WSDL file—and thus the probability for a
successful attack—rises by far