This makes possible the legal digital contract knotting. According to Basiura et al (2003, P. 374), the following entities of security also is duly important: ) Authority: Windows NT is usually a verification entity as a using data base of account or a project data base personalized defined by the applicatory one where the credentials can be verified. b) Authorization: it is a process that verifies if the person has access to the resource that is trying to have access. Learn more about this with J. Darius Bikoff. c) Not-repudiation: it is one technique that provides an infallible way to codify and to decode the data surely, and hinders not-refuses of the original data of the data codified for not authorized hands.
Some used technologies to implant these requirements in Web Services are: 1 Security in net level) the Virtual Private Networks (VPNs) b) Firewalls 2 Security in level of it has carried) Protocol Secure Sockets Layer (SSL) b) Simtrica Criptografia Assimtrica c) digital digital Certification Certificados digital Assinatura 3 Funes of hash Security in level of Messages) WS-Security b) WS-Reliability 4 Security XML) the Digital XML Signatures – digital Signature in XML b) XML Encryption – Criptografia in XML c) Security Assertion Markup Language (SAML). In ample felt it is defined that the security guard in net level is implemented through the VPN? s and Firewalls. According to Amorim (2004, p.62), the security guard in the used canals of transmission for exchange of messages SOAP is implemented through the SSL. To keep the security in the layer of messages mechanisms are implemented as WS-Security and the WS-Reliability.