Trust-Based Privacy Authorization Model for Web Service Composition

被引:0
|
作者
Zheng, Jun [1 ]
Huang, Zhiqiu [2 ]
Hu, Jun [2 ]
Wei, Ou [2 ]
Liu, Linyuan [2 ]
机构
[1] China Aeronaut Polytechnol Estab, Qual Engn Technol Ctr, Beijing, Peoples R China
[2] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Peoples R China
关键词
Privacy; Access control; Web Service composition; Trust;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid growth of web applications has prompted increasing interest in the area of composite web services that involve several service providers. This increased use of composite services has meant that more and more personal information of consumers is being shared with web service providers, leading to the need to guarantee the privacy of consumers. This paper proposes a trust-based privacy authorization model for service composition, it uses privacy authorization policies to specify the privacy privileges of services. Then it utilizes the trust relationships among services to make privacy authorization decisions. Comparing to the traditional privacy access control approaches, this model can make the fine-grained authorization decision, thus efficiently protecting consumers' privacy.
引用
收藏
页码:409 / +
页数:3
相关论文
共 50 条
  • [31] Trust-based Service-Oriented Architecture
    Aljazzaf, Zainab M.
    Capretz, Miriam A. M.
    Perry, Mark
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2016, 28 (04) : 470 - 480
  • [32] Trust-based service composition in multi-domain environments under time constraint
    Zhang Tao
    Ma JianFeng
    Li Qi
    Xi Ning
    Sun Cong
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2014, 57 (09) : 1 - 16
  • [33] Trust-based service composition in multi-domain environments under time constraint
    ZHANG Tao
    MA JianFeng
    LI Qi
    XI Ning
    SUN Cong
    [J]. Science China(Information Sciences), 2014, 57 (09) : 110 - 125
  • [34] A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography
    Rathore, Manjari Singh
    Poongodi, M.
    Saurabh, Praneet
    Lilhore, Umesh Kumar
    Bourouis, Sami
    Alhakami, Wajdi
    Osamor, Jude
    Hamdi, Mounir
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 102
  • [35] Trust-based service composition in multi-domain environments under time constraint
    Tao Zhang
    JianFeng Ma
    Qi Li
    Ning Xi
    Cong Sun
    [J]. Science China Information Sciences, 2014, 57 : 1 - 16
  • [36] A Trust-Based Situation Awareness Model
    Aydogan, Reyhan
    Sharpanskykh, Alexei
    Lo, Julia
    [J]. MULTI-AGENT SYSTEMS (EUMAS 2014), 2015, 8953 : 19 - 34
  • [37] New approach to Web service composition using trust chain model
    Gao, Hong-Hao
    Li, Ying
    Zhang, Yuan-Yuan
    [J]. Tongxin Xuebao/Journal on Communications, 2011, 32 (9 A): : 77 - 86
  • [38] A Trust-Based News Spreading Model
    Carchiolo, V.
    Longheu, A.
    Malgeri, M.
    Mangioni, G.
    Previti, M.
    [J]. COMPLEX NETWORKS IX, 2018, : 303 - 310
  • [39] A Trust-based Secured Performant Funnel Mobile Service Discovery and Exposure Model
    El Ayeb, Walid
    Choukair, Zied
    [J]. 2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 270 - 275
  • [40] Trust-based Access Control for Privacy Protection in Collaborative Environment
    Li, Min
    Wang, Hua
    Ross, David
    [J]. ICEBE 2009: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2009, : 425 - +