B. Security Technologies
Here, security technologies, which specifically address
information exchange among trading partners using SOAP
messaging, are to be illustrated.
Figure 1 depicts a security architecture that should be kept
in mind throughout this section. At the transport level, we
have a collection of security technologies. We here chose
HTTP Basic Authentication and Secure Socket Layer (SSL).
SOAP security provides transport-agnostic security measures.
We will discuss digital signatures, encryption, and security
assertions for SOAP messages.
Focusing on the internal processes within a company, we
will describe authorizations to protect resources by giving
appropriate permissions to the accessing entities. Finally, we
will discuss Public Key Infrastructure (PKI) [5] that enables
key management via XML. These technologies above will be
illustrated in the following sections.