Access Control for Human Tasks in Service Oriented Architecture

Author(s):  
Xin Wang ◽  
Yanchun Zhang ◽  
Hao Shi
Author(s):  
Yumna Ghazi ◽  
Rahat Masood ◽  
Muhammad Awais Shibli ◽  
Sara Khurshid

The Cloud technology takes Service Oriented Architecture to the next level, where applications and infrastructure can be outsourced over the internet. It affords flexibility to businesses in terms of the on-demand scalability of services as well as the corresponding payment model. However, these advantages do not make up for the inherent security weaknesses in the Cloud. Among various concerns, Cloud providers struggle to provide adequate authorization mechanisms that would protect customer's critical data. In this regard, Usage Control (UCON) is considered to be the next generation model for digital rights management for all the service models of Cloud. Limited literature work exists on the UCON model; however, new tracks need to be laid out to make this model comply with international standards and policy languages. This chapter provides standardized UCON policy specifications, which will help in the effective development of access control for the Cloud environment.


Author(s):  
Khurrum Mustafa Abbasi ◽  
Irfan ul Haq ◽  
Ahmad Kamran Malik ◽  
Basit Raza ◽  
Adeel Anjum

Service-Oriented Architecture (SOA) has introduced a phenomena of system's interaction with maximum users. With the development of high speed Internet services, the use of remote devices and software has rapidly increased. It has opened new gateways for renting out resources. The Cloud Service Chain is a process of ownership transfer of a service at different levels by different service providers. The concept of service chain poses novel challenges related to security, trust and privacy of data. In this chapter, we are introducing a mechanism of access control for Cloud service chains. We have discussed the realization of Role-Based Access Control (RBAC) to services of Federated-Cloud. When services are purchased in bundle, separate SLA is signed for each. We are also going to introduce a dynamic Role-Level Agreement (RLA) for such type of access control to services. The RLA will be an aggregated SLA for different services in a role. This will be helpful for service providers and the customers to sign a single document for a bundle rather than having separate one for every service.


Author(s):  
K. Sudhakar ◽  
M.James Stephen ◽  
P.V.G.D. Prasad Reddy

Service-oriented architecture (SOA)[1] is an incessant term to deal with various administrations dependent on solicitations of various clients in various ongoing applications. Still, now, a few people don't have total information about what SOA really has done, they get confounded how SOA identifies with distributed computing. On account of cloud administration usage in SOA need security mindful help creation with finegrained stream control to make sure about web administrations at execution time to share various administrations to various clients in dispersed condition? Routinely various models were acquainted with investigating secure web administrations at execution of various administrations. Because of access control infringement, they will take high execution time and other leader boundaries profoundly, and furthermore they don't control access assurance arrangements in composite administrations, which may deliver bothersome information spillage. To conquer these infringement issues in SOA, we present Integrated Novel Multi-Level Composite Service Model (INMLCSM)[2] to lessen infringement calculation cost dependent on customer authentic and demonstrate customer composite administrations and furthermore perform nearby/distant strategy calculation for highest customers. We acquaint idea of change factor with characterize halfway administrations. Our proposed approach portrays forceful exploratory outcomes.


Sign in / Sign up

Export Citation Format

Share Document