Specification of access control and certification policies for semantic web services

被引:0
|
作者
Agarwal, S [1 ]
Sprick, B
机构
[1] Univ Karlsruhe, Inst Appl Informat & Formal Descript Methods, Karlsruhe, Germany
[2] Indian Inst Sci, Dept Comp Sci & Automat, Bangalore 560012, Karnataka, India
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Web service providers specify access control policies to restrict access to their Web services. It turned out, that since the Web is an open, distributed and dynamic environment, in which a central controlling instance cannot be assumed, capability based access control is most suitable for this purpose. However, since practically every participant can certify capabilities defined in his/her own terminology, determining the semantics of certified capabilities and the trustworthiness of certification authorities are two major challenges in such a setting. In this paper, we show, (1) how certification authorities and their certification policies can be modeled semantically (2) how Web service providers can specify and check the consistency of their access control policies and (3) how end users can check automatically, whether they have access to a Web service.
引用
收藏
页码:348 / 357
页数:10
相关论文
共 50 条
  • [1] Specification of access control policies for web services
    Liu, Miao
    Zhang, Wei
    Liu, Huai-Liang
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 472 - 475
  • [2] Access control for semantic web services
    Agarwal, S
    Sprick, B
    [J]. IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, 2004, : 770 - 773
  • [3] Semantic Access Control for Web Services
    Liu, Miao
    Xie, Dongqing
    Li, Peng
    Zhang, Xunlai
    Tang, Chunming
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 55 - +
  • [4] A Model for Specification, Composition and Verification of Access Control Policies and Its Application to Web Services
    Derakhshandeh, Zahra
    Ladani, Behrouz Tork
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 3 (02): : 103 - 120
  • [5] Semantic Usage Policies for Web Services
    Speiser, Sebastian
    [J]. SEMANTIC WEB - ISWC 2009, PROCEEDINGS, 2009, 5823 : 982 - 989
  • [6] Semantic Similarity-Based Web Services Access Control
    Zhao, Yi
    Wang, Xia
    [J]. AUTONOMOUS SYSTEMS: DEVELOPMENTS AND TRENDS, 2011, 391 : 339 - +
  • [7] An approach to automating the integration of the Access Control Policies for Web Services
    Alodib, Mohammed
    [J]. 2013 14TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD 2013), 2013, : 181 - 187
  • [8] Access Control Policies for Web Services in Medical Aid System
    Kuang, Li-Qun
    Zhang, Yuan
    Han, Xie
    [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL 2, PROCEEDINGS, 2009, : 167 - 170
  • [9] Semantic Web Technologies to aid Dominance Detection for Access Control Policies
    Barron, Jason
    Davy, Steven
    [J]. 2013 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2013), 2013, : 780 - 783
  • [10] Towards Specification Based Testing for Semantic Web Services
    Jokhio, M. Shaban
    Dobbie, Gillian
    Sun, Jing
    [J]. ASWEC 2009: 20TH AUSTRALIAN SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2009, : 54 - 63