A Technical Architecture for Enforcing Usage Control Requirements in Service-Oriented Architectures

被引:0
作者
Agreiter, B. [1 ]
Alam, M. [1 ]
Breu, R. [1 ]
Hafner, M. [1 ]
Pretschner, A.
Seifert, J. -P. [1 ]
Zhang, X.
机构
[1] Univ Innsbruck, A-6020 Innsbruck, Austria
来源
SWS'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON SECURE WEB SERVICES | 2007年
关键词
SOA; Policies; Trusted Computing; Usage Control; Access Control;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present an approach to modeling and enforcing usage control requirements on remote clients in service-oriented architectures. Technically, this is done by leveraging a trusted software stack relying on a hardware-based root of trust and a trusted Java virtual machine to create a measurable and hence trustworthy client-side application environment. We define a model-driven approach to specifying remote policies that makes the technical intricacies of the target platform transparent to the policy modeler.
引用
收藏
页码:18 / 25
页数:8
相关论文
共 29 条
[1]  
ALAM M, 2006, IEEE ARES
[2]  
ALAM M, ANN SELINUX IN PRESS
[3]  
ALAM M, 2004, P INMIC
[4]  
Anderson R., 2002, OPEN SOURCE SOFTWARE
[5]  
[Anonymous], XML ENCRYPTION SYNTA
[6]  
[Anonymous], 2002, TRUSTED COMPUTING PL
[7]  
BAJAJ S, 2006, WEB SERVICES POLICY
[8]  
Breu R, 2004, LECT NOTES COMPUT SC, V2984, P165
[9]  
Eastlake D., 2002, XML Signature Syntax and Processing
[10]  
Grawrock David, 2005, INTEL SAFER COMPUTIN