期刊文献+

组合Web服务访问控制策略合成 被引量:2

Access control policies composition for composite Web services
下载PDF
导出
摘要 针对Web服务多域环境下组合服务的访问控制策略合成问题,首先提出基于属性的Web服务访问控制策略描述框架,并结合原子属性值限制的属性描述方法,对服务访问控制策略进行了形式化表达。然后,通过分析服务组合描述文档中的控制结构,并研究访问控制策略合成算子和访问控制策略规则的合成运算,提出组合Web服务访问控制策略合成方法,实现了组合服务访问控制策略的合成。最后,结合实例给出组合Web服务的访问控制策略合成流程,验证了合成方法的实用性。 For access control policy composition problem of composite services in Web services multi-domain environment,the attribute based Web services access control policy description framework was proposed and the services access control policies were formally expressed with atomic attribute value constraint.After analyzing the control structures in services composition description document,combining the access control policy composition operators with access control policy rule composition operation,the composite Web services access control policies composition method was designed to compose the composite service access control policies.Finally,the Web services access control policy composition process was given and the practicability of composition method was verified through a case.
出处 《计算机应用》 CSCD 北大核心 2012年第12期3430-3434,共5页 journal of Computer Applications
基金 国家973计划项目(2011CB311801) 河南省科技创新人才计划项目(114200510001)
关键词 WEB服务 服务组合 访问控制 策略合成 Web services services composition access control policy composition
  • 相关文献

参考文献16

  • 1KUZU M, CICKLI N K. Dynamic planning approach to automated Web service composition[ J]. Applied Intelligence, 2012, 36( 1): 1 -28.
  • 2DMELLO D A, ANANTHANARAYANA V S, SALIAN S. A review of dynamic Web service composition techniques[ J]. Communica- tions in Computer and Information Science, 2011, 133(3): 85 - 97.
  • 3SHRAVANI D, SURESI-I P V, PADMAJA B R, et al. Web serv- ices security architectures composition and contract design using RBAC[ J]. International Journal on Computer Science and En- gineering, 2010, 8(2): 2609-2615.
  • 4上超望,赵呈领,刘清堂,王艳凤.组合Web服务访问控制技术研究综述[J].计算机科学,2011,38(10):13-15. 被引量:7
  • 5YUAN E, TONG J. Attribute Based Access Control (ABAC) for Web services[ C]/! Proceedings of the 2005 IEEE International Conference on Web Services. Wash- ington, DC: IEEE Computer Society, 2005:561-569.
  • 6上超望,杨宗凯,刘清堂,赵呈领.组合Web服务分层安全模型研究[J].计算机科学,2010,37(2):113-115. 被引量:3
  • 7SRIVATSA M, IVENGAR A, MIKALSEN T A, et al. An access control system for Web service compositions [ C]/! Proceedings of the 2007 IEEE International Con- ference on Web Services. Washington, DC: IEEE Com- puter Society, 2007:1 - 8.
  • 8BERTINO E, CRAMPTOU J, PACI F. Access control and authorization constraints for WS-BPEL[ C]// Pro- ceedings of the 2006 IEEE International Conference on Web Services. Washington, DC: IEEE Computer Socie- ty, 2006:275-284.
  • 9SATOH F, TOKUDA T. Security policy composition for composite services[ C]// Proceedings of the 2008 IEEE International Conference on Web Engineering. Washing- ton, DC: IEEE Computer Society, 2008:86-97.
  • 10AGARWAL S, SPRICK B. Access control for semantic Web serv- ices[ C]/! Proceedings of the 2008 IEEE International Conference on Web Services. Washington, DC: IEEE Computer Society, 2004:770-773.

二级参考文献41

  • 1HUAI Jinpeng HU Chunming LI Jianxin SUN Hailong WO Tianyu.CROWN:A service grid middleware with trust management mechanism[J].Science in China(Series F),2006,49(6):731-758. 被引量:8
  • 2Joachim B, Barbara C, et al. Towards Secure Execution Orders for Composite Web Services[C]//Proc. of 2007 IEEE International Conference on Web Services. 2007:489- 496.
  • 3Carminati B, Ferrari E, et al. Security Conscious Web Service Composition with Semantic Web Support[C]//Proc. of the First International Workshop on Security Technologies for Next Genera tion Collaborative Business Applications. 2007 : 695-704.
  • 4Huang D. Semantic policy-based security framework for business processes [C] //Proc. of the Semantic Web and Policy Workshop. 2005 : 27-31.
  • 5Menzel M,Wolter C, Meinel C. Access Control for Cross organisational Web Service Composition[J]. Journal of Information Assurance and Security,2007,2(2) :155-160.
  • 6Charfi A,Mezini M. Using Aspects for Security Engineering of Web Service Compositions[C]//Proc. of In Proc. of the IEEE International Conference on Web Services. 2005:59-66.
  • 7Anoop S, Theodore W, Karen S. NIST Special Publication 800- 95[EB/OL]. Guide to secure web services. Recommendations of the National Institute of Standards and Technology. August 2007. http:/csrc, nist. gov/publications/nistpubs/800-95/ SP800-95. pdf.
  • 8Chun S A, Atluri V, Adam N R. Using Semantics for Policy - based Web Services Composition[J]. Journal of Distributed and Parallel Databases, 2005,18 ( 1 ):37-64.
  • 9Smeureanu I, Diosteanu A. Knowledge Dynamics in Semantic Web Service Composition for Supply Chain Management Appli- cations[J]. Journal of Applied Quantitative Methods, 2010, 5 (1):1-13.
  • 10Shravani D, Suresh P V, Padmaja B R, et al. Web Services Security Architectures Composition and Contract Design Using RBAC [J]. International Journal on Computer Science and Engineering, 2010,8(2) : 2609-2615.

共引文献47

同被引文献13

  • 1宋善德,戴路,郭翔.WEB环境下基于角色的透明访问控制[J].计算机工程与科学,2004,26(11):1-3. 被引量:4
  • 2王维林,张来顺,张远洋.基于角色的Web Services动态访问控制模型[J].计算机应用,2006,26(11):2607-2609. 被引量:2
  • 3沈海波,洪帆.基于策略的Web服务访问控制研究[J].计算机科学,2007,34(5):107-110. 被引量:5
  • 4SANDHU R, COYNE E J. Role based access control models [ J ]. IEEE Computer, 1996,29 (2) :38-47.
  • 5THOMAS R K, SANDHU R S. Towards a task-based paradigm for flexible and adaptable access control in distributed applica- tions [ C ]//Proceedings of the 1992-1993 ACM SIGSAC New Security Paradigms Workshops. 1993:45 -60.
  • 6WANG L Y, JESEKERA D W, JAJODIA S. A logic-based framework for attribute based access control[ C ]//Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering. 2004:45-55.
  • 7ZHANG X W,LI Y J,NALLA D. An attribute-based access matrix Model[ C] //Proceedings of the 2005 ACM Symposium on Applied Computing. New York: ACM,2005:359-363.
  • 8OASIS STANDARD. Security Assertion Markup Language (SAML) [ EB/OL ]. [ 2013-10-10 ]. https ://www. oasis-open, org/ standards#samlv2.0.
  • 9OASIS STANDARD. eXtensible Access Control Markup Language (XACML) [ EB/OL ]. [ 2013-10-11 ]. https ://www. oasis- open. org/standards#xacmlv2.0.
  • 10李晓峰,冯登国,陈朝武,房子河.基于属性的访问控制模型[J].通信学报,2008,29(4):90-98. 被引量:80

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部