Security Policy Composition for Composite Web Services

被引:13
作者
Satoh, Fumiko [1 ]
Tokuda, Takehiro [2 ]
机构
[1] IBM Res Tokyo, Yamato, Kanagawa 2428502, Japan
[2] Tokyo Inst Technol, Dept Comp Sci, Meguro Ku, Tokyo 1528552, Japan
关键词
Composite web services; quality of service; LOGIC;
D O I
10.1109/TSC.2010.40
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An application based on the Service-Oriented Architecture (SOA) consists of an assembly of services, which is referred to as a composite service. A composite service can be implemented from other composite services, and hence, the application could have a recursive structure. Securing an SOA application is an important nonfunctional requirement. However, specifying a security policy for a composite service is not easy because the policy should be consistent with the policies of the external services invoked in the composite process. Therefore, this paper proposes a security policy composition mechanism that uses the existing policies of the external services. Our contribution is defining the process-independent policy composition rules and providing a method for semiautomatically creating a security policy of the composite service. Our method supports two approaches of policy composition: top-down and bottom-up. Our study makes it possible to verify the consistency of the policies without increasing a developer's workload, even if the composite service has a recursive structure.
引用
收藏
页码:314 / 327
页数:14
相关论文
共 20 条
  • [1] [Anonymous], 2011, WS SECURITY POLICY 1
  • [2] [Anonymous], 2011, WEB SERVICES POLICY
  • [3] [Anonymous], 2011, WEB SERVICES SECURIT
  • [4] [Anonymous], 2011, EXTENSIBLE ACCESS CO
  • [5] [Anonymous], 2011, WEB SERVICES BUSINES
  • [6] Bhargavan K., 1992, P 11 ACM C COMP COMM, P268
  • [7] Charfi A, 2005, 2005 IEEE International Conference on Web Services, Vols 1 and 2, Proceedings, P59
  • [8] Eclipse BPEL Project, 2011, ECL BPEL PROJ
  • [9] A LOGIC FOR REASONING ABOUT SECURITY
    GLASGOW, J
    MACEWEN, G
    PANANGADEN, P
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1992, 10 (03): : 226 - 264
  • [10] Using first-order logic to reason about policies
    Halpern, JY
    Weissman, V
    [J]. 16TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2003, : 187 - 201