PBA4WSSP: a policy-based architecture for web services security processing

被引:1
|
作者
Zeng, Hao [1 ]
Ma, Dianfu [1 ]
Zhao, Yongwang [1 ]
Li, Zhuqing [1 ]
机构
[1] Beihang Univ, Sch Comp Sci & Engn, Key Lab Software Dev Environm, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Web services; Security; Security policy; PBA4WSSP;
D O I
10.1007/s11761-013-0143-5
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Due to the dynamic, heterogeneous and interorganizational nature, different web services and different ports or operations in the same service, even the same services at different times may have their different security requirements because of their different security domains and different business backgrounds. How to design a flexible, fine-grained and comprehensive architecture for web services security processing has become a matter of great urgency. However, no ideal solutions have been worked out for these problems. As a result of our study, we have presented in this paper a policy-based architecture termed policy-based architecture for web services security processing (PBA4WSSP) to meet the dynamic, complete and fine-grained security requirements. In PBA4WSSP, the processing of all security problems is based on security policy in service stage to support flexibly security configuration. Moreover, we have designed a service policy model to describe the fine-grained security requirements. And the conversion method between security policy model and security policy expression has also been described. In addition, a staged complete security processing architecture is provided to reduce the dependency among protocol implementations. Furthermore, with PBA4WSSP, a web service security module has been designed and implemented as well. Eventually, the perfor-mance evaluation results amply demonstrate that our system is flexible and usable.
引用
收藏
页码:55 / 72
页数:18
相关论文
共 50 条
  • [31] An architecture for policy-based cognitive tactical networking
    Denker, Grit
    Talcott, Carolyn
    Ghanadan, Reza
    Kumar, Srikanta
    MILCOM 2006, VOLS 1-7, 2006, : 3446 - +
  • [32] A policy tree-based architecture for web services authorization
    Zeng, Hao
    Zhao, Yongwang
    Ma, Dianfu
    Journal of Computational Information Systems, 2013, 9 (21): : 8581 - 8590
  • [33] User isolation and policy-based security management
    Rayes, MA
    Cheung, M
    SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 75 - 79
  • [34] POSITIF: a policy-based security management system
    Basile, Cataldo
    Lioy, Antonio
    Perez, Gregorio Martinez
    Garcia Clemente, Felix J.
    Skarmeta, Antonio F. Gomez
    EIGHTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS - PROCEEDINGS, 2007, : 280 - 280
  • [35] Policy-based security management for enterprise systems
    Mukkamala, R
    Chekuri, L
    Moharrum, M
    Palley, S
    RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY XVIII, 2004, 144 : 219 - 233
  • [36] A semantic active policy-based management architecture
    Chamoun, M
    Kilany, R
    Serhrouchni, A
    2004 IEEE Workshop on IP Operations and Management Proceedings (IPOM 2004): SELF-MEASUREMENT & SELF-MANAGEMENT OF IP NETWORKS & SERVICES, 2004, : 224 - 232
  • [37] Policy-based adaptable service systems architecture
    Supadulchai, Paramai
    Aagesen, Finn Arve
    21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS, PROCEEDINGS, 2007, : 656 - +
  • [38] Network security project management: A security policy-based approach
    Krichene, Jihene
    Boudriga, Noureddine
    2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 784 - 789
  • [39] A Policy-based Business Driven Network Architecture
    Zhang, Min
    Chen, Changjia
    PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS I AND II, 2010, : 308 - 313
  • [40] A policy-based bandwidth resource provisioning architecture
    Chieng, D
    Marshall, A
    NETWORK CONTROL AND ENGINEERING FOR QOS, SECURITY AND MOBILITY, 2003, 107 : 179 - 190