Access Control Model for Composite Web Services

被引:0
作者
Jiang, Huangqin [1 ]
Zhang, Hongqi [1 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Henan Prov Key Lab Informat Secur, Zhengzhou, Peoples R China
来源
PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY | 2012年
关键词
Web services; services composition; access control model; attribute; policies composition;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With enterprises increasingly depending on Web services to build complex information systems, security problems especially the services access control problems are becoming serious issues. For the cross-domain, dynamic, fine-grained requirements of composite services access control in Web services multi-domain environment, we propose a composite Web services access control model combining the idea of attribute based access control. Then, elements and relations among elements in our model are formally described. In our model, composite Web services access control policies can be composed according to the relations of services composition and access control policies of component Web services. The access control for services parameters, single Web services and composite Web services are all supported in our model. We have implemented a prototype of our model and put forward the work process of our model. Finally, the advantages over traditional access control models are showed by analyzing characteristics of our model.
引用
收藏
页码:684 / 688
页数:5
相关论文
共 50 条
  • [21] Trust Based Privacy Preserving Access Control In Web Services Paradigm
    Bhatia, Rekha
    Singh, Manpreet
    2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013), 2013, : 243 - 246
  • [22] A Privacy Access Control Framework for Web Services Collaboration with Role Mechanisms
    Liu, Linyuan
    Huang, Zhiqiu
    Zhu, Haibin
    ADVANCED RESEARCH ON ELECTRONIC COMMERCE, WEB APPLICATION, AND COMMUNICATION, PT 2, 2011, 144 : 258 - +
  • [23] Web services enabled E-market access control (EMAC)
    Wang, HJ
    Zhao, JL
    ICWS'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WEB SERVICES, 2003, : 69 - 75
  • [24] Scheduling of Composite Web Services
    Dyachuk, Dmytro
    Deters, Ralph
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 19 - +
  • [25] A Big Data approach to enhance the integration of Access Control Policies for Web Services
    Alodib, Mohammed
    Malik, Zaki
    2015 IEEE/ACIS 14TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2015, : 41 - 46
  • [26] Ws-AC: A fine grained access control system for Web services
    Bertino, E
    Squicciarini, AC
    Paloscia, I
    Martino, L
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2006, 9 (02): : 143 - 171
  • [27] Towards a Monitoring Framework for the Automatic Integration of the Access Control Policies for Web Services
    Alodib, Mohammed
    INTERNATIONAL JOURNAL OF NETWORKED AND DISTRIBUTED COMPUTING, 2015, 3 (03) : 137 - 149
  • [28] Ws-AC: A Fine Grained Access Control System for Web Services
    Elisa Bertino
    Anna C. Squicciarini
    Ivan Paloscia
    Lorenzo Martino
    World Wide Web, 2006, 9 : 143 - 171
  • [29] WST: a tool supporting timed composite Web Services Model transformation
    Emilia Cambronero, M.
    Diaz, Gregorio
    Martinez, Enrique
    Valero, Valentin
    Tobarra, Llanos
    SIMULATION-TRANSACTIONS OF THE SOCIETY FOR MODELING AND SIMULATION INTERNATIONAL, 2012, 88 (03): : 349 - 364
  • [30] A correct-by-construction model for attribute-based access control: Illustration: web-based healthcare services
    Gadouche, Hania
    Farah, Zoubeyr
    Tari, Abdelkamel
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (03): : 1517 - 1528