PolyOrBAC

2011 ◽  
pp. 537-557
Author(s):  
Anas Abou El Kalam ◽  
Yves Deswarte

With the emergence of Web Services-based collaborative systems, new issues arise, in particular those related to security. In this context, Web Service access control should be studied, specified and enforced. This work proposes a new access control framework for Inter-Organizational Web Services: “PolyOr- BAC”. On the one hand, the authors extend OrBAC (Organization-Based Access Control Model) to specify rules for intra- as well as inter-organization access control; on the other hand, they enforce these rules by applying access control mechanisms dedicated to Web Services. Furthermore, the authors propose a runtime model checker for the interactions between collaborating organizations, to verify their compliance with previously signed contracts. In this respect, not only their security framework handles secure local and remote accesses, but also deals with competition and mutual suspicion between organizations, controls the Web Service workflows and audits the different interactions. In particular, every deviation from the signed contracts triggers an alarm, the concerned parties are notified, and audits can be used as evidence for a judge to sanction the party responsible for the deviation.

Author(s):  
Anas Abou El Kalam ◽  
Yves Deswarte

With the emergence of Web Services-based collaborative systems, new issues arise, in particular those related to security. In this context, Web Service access control should be studied, specified and enforced. This work proposes a new access control framework for Inter-Organizational Web Services: “PolyOr- BAC”. On the one hand, the authors extend OrBAC (Organization-Based Access Control Model) to specify rules for intra- as well as inter-organization access control; on the other hand, they enforce these rules by applying access control mechanisms dedicated to Web Services. Furthermore, the authors propose a runtime model checker for the interactions between collaborating organizations, to verify their compliance with previously signed contracts. In this respect, not only their security framework handles secure local and remote accesses, but also deals with competition and mutual suspicion between organizations, controls the Web Service workflows and audits the different interactions. In particular, every deviation from the signed contracts triggers an alarm, the concerned parties are notified, and audits can be used as evidence for a judge to sanction the party responsible for the deviation.


Author(s):  
Liu Hui ◽  
He Xudong ◽  
Gao Fan ◽  
Wang KaiLun ◽  
Yuan Enze

Web services have covered all areas of social life, and various browsers have become necessary software on computers and mobile phones, and they are also the entrances to Web services. All kinds of threats to web data security continue to appear, so web services and browsers have become the focus of security. In response to the requirements of Web service for access entity identification and data access control, this paper proposes a multi-dimensional browser fingerprint detection method based on adversarial learning, and designs a Web service access control framework combined with browser fingerprint detection. Through the joint use of multi-dimensional browser features, adversarial learning is used to improve the accuracy and robustness of browser fingerprint detection; a cross-server and browser-side Web service access control framework is established by creating tags for Web data resources and access entities. Based on the mapping relationship between browser fingerprint detection entities and data resources, fine-grained hierarchical data access control is realized. Through experiments and analysis, the browser fingerprint detection method proposed in this paper is superior to existing machine learning detection methods in terms of accuracy and robustness. Based on the adversarial learning method, good detection results can be obtained in the case of a small number of user samples. At the same time, the open source data set is further used to verify the advantages of the method in this paper. The Web service access control framework can satisfy the requirements of Web data security control, is an effective supplement to user identification technology, and is implementable.


2014 ◽  
Vol 989-994 ◽  
pp. 4528-4532
Author(s):  
Meng Liu ◽  
Lian Zhong Liu ◽  
Yu Zhang

Access control is an important technique which is used to protect system resources from damage by unauthorized users. With the advantage of web services, the access control module was released as web services interfaces. In order to control accessing to system resources and take advantage of web services,this paper proposes the web service-oriented access control (WSOAC) model. The development of access control is firstly introduced; after that the authors describe this model with two levels—platform and tenant and then present the execution process. At last, the paper summarizes the characteristics of the model and the next step.


2012 ◽  
Vol 195-196 ◽  
pp. 498-503 ◽  
Author(s):  
Hai Bo Shen ◽  
Yu Cheng

As computing technology becomes more pervasive and mobile services are deployed, applications will need flexible access control mechanisms. Unlike traditional approaches based on the identity/role for access control, access decisions for these applications will depend on the combination of the required attributes of users and the contextual information. This paper proposes a semantic-aware context-based access control framework (called SA_CBAC) to be applied in mobile web services environment by combining semantic web technologies with context-based access control mechanism. In order to handle context information in the framework, this paper proposes a context ontology to represent contextual information and employ it in the inference engine. This paper also focuses on access control policies and addresses these issues by representing context, user attributes and resource attributes in knowledge base and extending XACML to incorporate the knowledge base.


Author(s):  
Pierluigi Plebani ◽  
Filippo Ramoni

The chapter introduces a quality of Web service model which can be exploited by a Web service broker during the Web service selection phase. The model considers both user and provider standpoints. On the one hand, providers express their capabilities with respect to measurable dimensions (e.g., response time, latency). On the other hand, users can define the requirements with a higher level of abstraction (e.g. performance). Since the quality is subjective by definition, the presented quality model also maps the user preferences, i.e., how much a quality dimension is more important than another one in evaluating the overall quality. The Analytic Hierarchy Approach (AHP) has been adopted as a technique for expressing user preferences. The chapter also describes how the model can be exploited in the Web service selection process. Starting from a set of functionally equivalent Web services, the selection process identifies which are the Web services able to satisfy the user requirements. Moreover, according to a cost-benefit analysis, the list of selected Web services is sorted and, as a consequence, the best Web service is identified.


2019 ◽  
Vol 54 (6) ◽  
Author(s):  
Sawsan Ali Hamid ◽  
Rana Alauldeen Abdalrahman ◽  
Inam Abdullah Lafta ◽  
Israa Al Barazanchi

Recently, web services have presented a new and evolving model for constructing the distributed system. The meteoric growth of the Web over the last few years proves the efficacy of using simple protocols over the Internet as the basis for a large number of web services and applications. Web service is a modern technology of web, which can be defined as software applications with a programmatic interface based on Internet protocol. Web services became common in the applications of the web by the help of Universal, Description, Discovery and Integration; Web Service Description Language and Simple Object Access Protocol. The architecture of web services refers to a collection of conceptual components in which common sets of standard can be defined among interoperating components. Nevertheless, the existing Web service's architecture is not impervious to some challenges, such as security problems, and the quality of services. Against this backdrop, the present study will provide an overview of these issues. Therefore, it aims to propose web services architecture model to support distributed system in terms of application and issues.


2016 ◽  
Vol 12 (2) ◽  
pp. 177-200 ◽  
Author(s):  
Sanjay Garg ◽  
Kirit Modi ◽  
Sanjay Chaudhary

Purpose Web services play vital role in the development of emerging technologies such as Cloud computing and Internet of Things. Although, there is a close relationship among the discovery, selection and composition tasks of Web services, research community has treated these challenges at individual level rather to focus on them collectively for developing efficient solution, which is the purpose of this work. This paper aims to propose an approach to integrate the service discovery, selection and composition of Semantic Web services on runtime basis. Design/methodology/approach The proposed approach defined as a quality of service (QoS)-aware approach is based on QoS model to perform discovery, selection and composition tasks at runtime to enhance the user satisfaction and quality guarantee by incorporating non-functional parameters such as response time and throughput with the Web services and user request. In this paper, the proposed approach is based on ontology for semantic description of Web services, which provides interoperability and automation in the Web services tasks. Findings This work proposed an integrated framework of Web service discovery, selection and composition which supports end user to search, select and compose the Web services at runtime using semantic description and non-functional requirements. The proposed approach is evaluated by various data sets from the Web Service Challenge 2009 (WSC-2009) to show the efficiency of this work. A use case scenario of Healthcare Information System is implemented using proposed work to demonstrate the usability and requirement the proposed approach. Originality/value The main contribution of this paper is to develop an integrated approach of Semantic Web services discovery, selection and composition by using the non-functional requirements.


Sign in / Sign up

Export Citation Format

Share Document