Trust-based security model and enforcement mechanism for Web service technology

被引:0
|
作者
Yang, SK [1 ]
Lam, H [1 ]
Su, SYW [1 ]
机构
[1] Univ Florida, Database Syst Res & Dev Ctr, Gainesville, FL 32611 USA
来源
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The emerging Web service technology has enabled the development of Internet-based applications that integrate distributed and heterogeneous systems and processes which are owned by different organizations. Compared to centralized systems and client-server environments, the Web service environment is much more dynamic and security for such an environment poses unique challenges. For example, an organization (e.g., a service provider or a service broker) cannot predetermine the users of its resources and fix their access privileges. Also, service providers come and go. The users of services must have some assurances about the services and the organizations that provide the services. Thus, the enforcement of security constraints cannot be static and tightly coupled. The notion of trust agreement must be established to delegate the responsibility of certification of unknown users, services, and organizations. In this paper, we describe a Trust-based Security Model (TSM) that incorporate the traditional security concepts (e.g., roles, resources, operations) with new security concepts that are specific to the Web service environment. The security concepts of TSM are then applied to the general Web service model to include security considerations. Finally, an event-driven, rule-based approach to the enforcement of security in a Web service environment is described.
引用
收藏
页码:151 / 160
页数:10
相关论文
共 50 条
  • [31] Trust-based service evaluation and selection model in pervasive computing environment
    School of Computer Science and Technology, Shandong University, Ji'nan 250100, China
    [J]. Ruan Jian Xue Bao, 2006, SUPPL. (200-210):
  • [32] Trust-based group services selection in web-based service-oriented environments
    Xing Su
    Minjie Zhang
    Yi Mu
    [J]. World Wide Web, 2016, 19 : 807 - 832
  • [33] A trust-based selection approach for composite service
    Li, Jun
    Zheng, Xiao-Lin
    Chen, De-Ren
    [J]. Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2012, 46 (05): : 885 - 892
  • [34] Flexible trust-based access control mechanism for security and privacy enhancement in ubiquitous systems
    Giang, Pho Duc
    Hung, Le Xuan
    Lee, Sungyoung
    Lee, Young-Koo
    Lee, Heejo
    [J]. MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 698 - +
  • [35] Trust-based Service-Oriented Architecture
    Aljazzaf, Zainab M.
    Capretz, Miriam A. M.
    Perry, Mark
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2016, 28 (04) : 470 - 480
  • [36] Energy Efficient Trust-based Security Mechanism for Wireless Sensors and Unmanned Aerial Vehicles
    Valentin-Alexandru, Vladuta
    Ion, Bica
    Victor-Valeriu, Patriciu
    [J]. PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI-2019), 2019,
  • [37] Enhancing cloud network security with a trust-based service mechanism using k-anonymity and statistical machine learning approach
    Saini, Himani
    Singh, Gopal
    Dalal, Sandeep
    Lilhore, Umesh Kumar
    Simaiya, Sarita
    Dalal, Surjeet
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024,
  • [38] Trust-based service composition and selection in service oriented architecture
    Guo, Jing-Jing
    Ma, Jian-Feng
    Guo, Xin-Xin
    Li, Xing-Hua
    Zhang, Jun-Wei
    Zhang, Tao
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (05) : 862 - 880
  • [39] Trust-based service composition and selection in service oriented architecture
    Jing-Jing Guo
    Jian-Feng Ma
    Xin-Xin Guo
    Xing-Hua Li
    Jun-Wei Zhang
    Tao Zhang
    [J]. Peer-to-Peer Networking and Applications, 2018, 11 : 862 - 880
  • [40] TBM: A trust-based monitoring security scheme to improve the service authentication in the Internet of Things communications
    Alqahtani, Fayez
    Al-Makhadmeh, Zafer
    Tolba, Amr
    Said, Omar
    [J]. COMPUTER COMMUNICATIONS, 2020, 150 : 216 - 225