Trust-based security model and enforcement mechanism for Web service technology

被引:0
|
作者
Yang, SK [1 ]
Lam, H [1 ]
Su, SYW [1 ]
机构
[1] Univ Florida, Database Syst Res & Dev Ctr, Gainesville, FL 32611 USA
来源
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The emerging Web service technology has enabled the development of Internet-based applications that integrate distributed and heterogeneous systems and processes which are owned by different organizations. Compared to centralized systems and client-server environments, the Web service environment is much more dynamic and security for such an environment poses unique challenges. For example, an organization (e.g., a service provider or a service broker) cannot predetermine the users of its resources and fix their access privileges. Also, service providers come and go. The users of services must have some assurances about the services and the organizations that provide the services. Thus, the enforcement of security constraints cannot be static and tightly coupled. The notion of trust agreement must be established to delegate the responsibility of certification of unknown users, services, and organizations. In this paper, we describe a Trust-based Security Model (TSM) that incorporate the traditional security concepts (e.g., roles, resources, operations) with new security concepts that are specific to the Web service environment. The security concepts of TSM are then applied to the general Web service model to include security considerations. Finally, an event-driven, rule-based approach to the enforcement of security in a Web service environment is described.
引用
收藏
页码:151 / 160
页数:10
相关论文
共 50 条
  • [1] Trust-Based Privacy Authorization Model for Web Service Composition
    Zheng, Jun
    Huang, Zhiqiu
    Hu, Jun
    Wei, Ou
    Liu, Linyuan
    [J]. INFORMATION AND MANAGEMENT ENGINEERING, PT V, 2011, 235 : 409 - +
  • [2] Trust-Based Privacy Authorization Model for Web Service Composition
    Zheng, Jun
    Huang, Zhiqiu
    Hu, Jun
    Wei, Ou
    Liu, Linyuan
    [J]. SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING: THEORY AND PRACTICE, VOL 2, 2012, 115 : 307 - +
  • [3] A Trust-Based Security Enforcement in Disruption-Tolerant Networks
    Oleshchuk, Vladimir
    [J]. PROCEEDINGS OF THE 2017 9TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS), VOL 1, 2017, : 514 - 517
  • [4] An Enforcement Architecture for Security and Trust Policies in Federated Web-service-based Systems
    Wu, Zhengping
    Wang, Lifeng
    [J]. 2009 IEEE 33RD INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, 2009, : 1002 - 1007
  • [5] A cognitive trust-based approach for Web Service discovery and selection
    Ali, AS
    Ludwig, SA
    Rana, OF
    [J]. THIRD EUROPEAN CONFERENCE ON WEB SERVICES, PROCEEDINGS, 2005, : 38 - 49
  • [6] Towards Trust-based Security Mechanism for Wireless Sensor Networks
    Gao, Jianqiao
    Pan, Julong
    Xu, Zhanyi
    Li, Ziyin
    [J]. 2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [7] Trust-based security adaptation mechanism for Vehicular Sensor Networks
    Javed, Muhammad Awais
    Zeadally, Sherali
    Hamid, Zara
    [J]. COMPUTER NETWORKS, 2018, 137 : 27 - 36
  • [8] Trust-based security routing mechanism in mobile social networks
    Shuang Yang
    Xingwei Wang
    Shuang Zhang
    Bo Yi
    Min Huang
    [J]. Neural Computing and Applications, 2020, 32 : 5609 - 5620
  • [9] Trust-based security routing mechanism in mobile social networks
    Yang, Shuang
    Wang, Xingwei
    Zhang, Shuang
    Yi, Bo
    Huang, Min
    [J]. NEURAL COMPUTING & APPLICATIONS, 2020, 32 (10): : 5609 - 5620
  • [10] Trust-Based Security; Or, Trust Considered Harmful
    Singer, Abe
    Bishop, Matt
    [J]. NEW SECURITY PARADIGMS WORKSHOP (NSPW 2020), 2020, : 76 - 89