Page 215 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 215
Unit 14: Web Services and Privacy
Internet privacy is a urgent matter due to the growing number of peeping toms on the Notes
Internet.
The term Web Services points to the technologies that permit for making connections.
Services are what you attach together using Web Services
Users of a Web service comprise persons (e.g., citizens and case officers), applications, and
other Web services.
A Web service usually has its own privacy policy that mentions a set of regulations
applicable to all users.
Data objects with comparable data privacy profiles form a privacy cluster.
A major inspiration of data clustering is that legal rules and self-defined policies enforcing
privacy are usually applicable to great segments of populations (e.g., residents of
a state).
Service-oriented architecture (SOA) is a method of designing software to offer services to
applications, or to other services, via published and discoverable interfaces
Much of the software industry concentrates so far has been on the underlying method for
executing Web services and their communications.
14.5 Keywords
Data Privacy Profile: A data privacy profile specifies that the access views that it exposes to the
dissimilar Web services.
Privacy: Privacy is a position wherein an entity can work on his/her information in isolation,
resulting in a choosy revelation of one’s uniqueness and information.
Service-oriented Architecture (SOA): It is a method of designing software to offer services to
applications, or to other services, via published and discoverable interfaces.
Web Services: The term Web Services points to the technologies that permit for making
connections.
14.6 Review Questions
1. Describe the significance of internet privacy.
2. How privacy of internet is violated?
3. How do websites affect in violating privacy?
4. Elucidate the issue of safeguarding internet privacy.
5. What are web services? Discuss its function in privacy.
6. Portray a privacy model with three different types.
7. Make distinction between user privacy and service privacy.
8. What is Service-oriented architecture (SOA)? How it is used in designing software?
9. How do you differentiate Architectural from Implementation Models?
10. Illustrate the security issues related with Service-oriented architecture (SOA).
11. What are the approaches used authorization? Discuss.
LOVELY PROFESSIONAL UNIVERSITY 209