期刊文献+

面向活动的BPEL4WS动态访问授权模型及实现研究

Study on Activity-oriented Dynamic Access Authorization Model for BPEL4WS
下载PDF
导出
摘要 业务流程访问控制机制是Web服务组合应用中的难点。针对现有BPEL4WS安全访问控制研究的不足,提出面向活动的BPEL4WS动态访问授权模型(ADABM)。通过解除组织模型和业务流程模型间的耦合关系,ADABM将BPEL4WS访问权限约束细化到活动一级,用户只在流程执行会话期的活动符合安全需求的情况下才拥有Web服务的访问授权,授权随着业务流程上下文动态授予和收回,授权流与业务流同步执行。文中最后还给出ADABM模型在Web服务安全组合应用中的实施框架。 Business process access control mechanism is a difficult problem in Web services composition application. Ac- cording to the current deficiency of research in BPEL4WS secure access control, an Activity-Oriented Dynamic Access Authorization Model for BPEL4WS(ADABM) was proposed. By dissolving the coupling relationship between the or- ganization model and business process model, ADABM refines the BPEL4WS access permission to activity level. The users can obtain the Web services access authorizations only when the corresponding activity meets the security require- ments in BPEL4WS execution session. The grants and revokes of the activity access authorization can be implemented along with the process context. At last, the paper also described the implementation architecture of ADABM in Web services secure composition.
出处 《计算机科学》 CSCD 北大核心 2014年第7期102-104,109,共4页 Computer Science
基金 华中师范大学中央高校基本科研业务费项目(CCNU13A05053) 教育部人文社科项目(11YJA880163) 湖北省教育规划课题(2011B039) 武汉市科技计划项目(2014060101010030) 国家"十二五"科技支撑计划课题(2012BAD35B02)资助
关键词 WEB服务组合 活动 BPEL4WS 访问授权 实现 Web services composition, Activity, BPEL4WS, Access authorization, Implementation
  • 相关文献

参考文献3

二级参考文献37

  • 1吕建,马晓星,陶先平,徐锋,胡昊.网构软件的研究与进展[J].中国科学(E辑),2006,36(10):1037-1080. 被引量:101
  • 2胡昊,殷琴,吕建.虚拟计算环境中服务行为与质量的一致性[J].软件学报,2007,18(8):1943-1957. 被引量:9
  • 3Smeureanu I, Diosteanu A. Knowledge Dynamics in Semantic Web Service Composition for Supply Chain Management Appli- cations[J]. Journal of Applied Quantitative Methods, 2010, 5 (1):1-13.
  • 4Shravani D, Suresh P V, Padmaja B R, et al. Web Services Security Architectures Composition and Contract Design Using RBAC [J]. International Journal on Computer Science and Engineering, 2010,8(2) : 2609-2615.
  • 5Zein R, Camille G, et al. Policy-Driven and Content-Based Web Services Security Gateway[J]. International Journal of Network Security, 2009,18 (1) : 253-265.
  • 6Mohamed S, Kamal B, et al. Web Services Discovery in Secure Collaboration Environments[J]. ACM Transactions on Internet Technology, 2007,8 (1): 52-74.
  • 7Christian E, Sebastian K, et al. Model Driven Development of Access Control Policies for Web Services[C]//Proc. of 2008 International Conference on Software Engineering and Applications. 2008:165- 172.
  • 8Hassan S G, Kadir W M, et al. AIMO.. An Effective Approach to Support Semantic Web Service Discovery and Composition[J]. International Journal of Computational Science,2009,3(2):133-150.
  • 9Dong Huang. Semantic Policy-Based Security Framework for Business Processes[C]//Proc. of 2005 Semantic Web and Policy Workshop. 2005 : 27-31.
  • 10Michael M, Wolter V, Meinel C. Access Control for Cross-Organisational Web Service Composition[J]. Journal of Information Assurance and Security,2007,2(2) : 155-160.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部