Validating Security Policy Conformance with WS-Security Requirements

被引:0
|
作者
Satoh, Fumiko [1 ]
Uramoto, Naohiko [1 ]
机构
[1] IBM Res Tokyo, Yamato, Kanagawa 2428502, Japan
关键词
WS-SecurityPolicy; WS-Security; Basic Security Profile; Conformance Validation;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Web Services Security (WS-Security) is a technology to secure the data exchanges in SOA applications. The security requirements for WS-Security are specified as a security policy expressed in Web Services Security Policy (WS-SecurityPolicy). The WS-I Basic Security Profile (BSP) describes the best-practices security practices for addressing the security concerns of WS-Security. It is important to prepare BSP-conformant security policies, but it is quite hard for developers to create valid security polices because the security policy representations are complex and difficult to fully understand. In this paper, we present a validation technology for security policy conformance with WS-Security messages. We introduce an Internal Representation (IR) representing a security policy and its validation rules, and a security policy is known to be valid if it conforms to the rules after the policy is transformed into the IR. We demonstrate the effectiveness of our validation technology and evaluate its performance on a prototype implementation. Our technology makes it possible for a developer without deep knowledge of WS-Security and WS-SecurityPolicy to statically check if a policy specifies appropriate security requirements.
引用
收藏
页码:133 / 148
页数:16
相关论文
共 50 条
  • [1] Generic security policy transformation framework for WS-Security
    Satoh, Fumiko
    Yamaguchi, Yumi
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, 2007, : 513 - +
  • [2] Attack-Tolerant Security Model for WS-Security
    Jesudoss, A.
    Subramaniam, N. P.
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2014), 2014, : 1536 - 1540
  • [3] Web Service security -: Vulnerabilities and threats within the context of WS-security
    Holgersson, J
    Söderström, E
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON STANDARDIZATION AND INNOVATION IN INFORMATION TECHNOLOGY, 2005, : 147 - 155
  • [4] Implementation of WS-Security and its performance improvements
    Makino, S
    Tamura, K
    Imamura, T
    Nakamura, Y
    [J]. ICWS'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WEB SERVICES, 2003, : 256 - 261
  • [5] Verified reference implementations of WS-security protocols
    Bhargavan, Karthikeyan
    Fournet, Cedric
    Gordon, Andrew D.
    [J]. WEB SERVICES AND FORMAL METHODS, PROCEEDINGS, 2006, 4184 : 88 - 106
  • [6] Security Testing Methodology for Vulnerabilities Detection of XSS in Web Services and WS-Security
    Salas, M. I. P.
    Martins, E.
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2014, 302 : 133 - 154
  • [7] Authenticated web services: A WS-Security based implementation
    Auletta, Vincenzo
    Blundo, Carlo
    Cimato, Stelvio
    De Cristofaro, Emiliano
    Raimato, Guerriero
    [J]. NEW TECHNOLOGIES, MOBILITY AND SECURITY, 2007, : 541 - +
  • [8] 基于WS-security的数据安全交换
    柳翠寅
    袁继敏
    韩敏
    [J]. 微计算机信息, 2007, (30) : 91 - 93
  • [9] Distributed security policy conformance
    Montanari, Mirko
    Chan, Ellick
    Larson, Kevin
    Yoo, Wucherl
    Campbell, Roy H.
    [J]. COMPUTERS & SECURITY, 2013, 33 : 28 - 40
  • [10] Server-Side Streaming Processing of WS-Security
    Gruschka, Nils
    Jensen, Meiko
    Lo Iacono, Luigi
    Luttenberger, Norbert
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2011, 4 (04) : 272 - 285