Research on Policy-Based Service-Oriented Computing Security

Article Preview

Abstract:

This article described the Web Services security protocols, and the policy description language XACML was analyzed in detail in the Web Services. XACML is characterized by the strong ability of expansion and the favorable inter-operation in the access control of the Web Services, which are concluded from the comparison in both SOA strategic architectures. A collection of XACML policy combination algorithms and decision algorithms were discussed in the policy-based service-oriented computing, then the policy control and access control mechanism were also illustrated, and the corresponding decision model was described, at last the development of XACML was prospected.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

602-607

Citation:

Online since:

May 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] G. Alonso et al. Web Services: concepts, architectures and applications. Springer Verlag Berlin Heidelberg (2004).

Google Scholar

[2] LI Xin, ZHANG Jun: Design and realization of XKMS model towards Web Services, Journal of Computer Engineering and Design, Vol. 31-8(2010), pp.1738-1742.

Google Scholar

[3] Kearney P: Message level Security for Web Services, Journal of Information Security Technical Security Technical Report, 2005, pp.41-50.

DOI: 10.1016/j.istr.2004.11.003

Google Scholar

[4] Andersen A H. An introduction to the Web Services Policy language (WSPL). In: Proceedings of Fifth IEEE International Workshop on Policies for Distributed Systems and Networks(POLICY 2004), Yorktown Heights, NY, United States, 2004, pp.189-192.

DOI: 10.1109/policy.2004.1309166

Google Scholar

[5] Zhang Yong-sheng, Wang Ying. Research on Trust-Authorization-based Access Control Model for Web Services. Proceedings of the 2th International Conference on Networks Security, Wireless Communications and Trusted Computing(NSWCTC 2010), April 24-25, 2010. Wuhan, China. Volume 1, pp.454-457.

DOI: 10.1109/nswctc.2010.113

Google Scholar

[6] S. Cantor, J. Kemp, R. Philpott, E. Maler. Assertions and Protocols for the OASIS Security Assertion Markup Language(SAML) V2. 0. OASIS Standard, 15 March (2005).

Google Scholar

[7] FU He-gang, LI Jing: Attribute-based Access Control Model for Web Services, Journal of Computer Science, Vol. 34-5(2007), pp.111-114.

Google Scholar

[8] SHEN Hai-bo, HONG Fan: Study on Policy-based Access Control for Web Services, Journal of Computer Science, Vol. 34-5(2007), pp.107-110.

Google Scholar

[9] ZHENG Qi-ying, SHEN Jian-jing: Access Control Model for Web Services Security Based on XACML, Journal of Computer Engineering and Design, Vol. 28-16(2007), pp.3282-3283.

Google Scholar

[10] Bhatti R, Bertino E, Ghafoor A. A trust-based Context Aware Access Control Model for Web Services[C]. In: Proceedings of the IEEE International Conference on Web Services(ICWS). (2004).

DOI: 10.1109/icws.2004.1314738

Google Scholar