Access Control Protocol for Conversation Based Composite Web Services in Pervasive Computing

被引:0
|
作者
Gao, Aiqiang [1 ,2 ,3 ]
Yang, Dongqing [1 ,2 ,3 ]
Tang, Shiwei [1 ,3 ]
Zhang, Ming [3 ]
机构
[1] Peking Univ, Minist Educ, Key Lab Machine Percept, Beijing, Peoples R China
[2] Peking Univ, Minist Educ, Key Lab High Confidence Software Technol, Beijing, Peoples R China
[3] Peking Univ, Sch Elect Engn & Comp Sci, Beijing, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Pervasive Computing; Access Control; Composite Web Service; Conversation;
D O I
10.1109/ICPCA.2008.4783602
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The emerging paradigm of pervasive computing and web services needs a flexible service discovery and composition infrastructure. The widespread use of Web services in pervasive environments is hindered by the lack of adequate security and privacy support. In this paper, we discuss an access control protocol for conversation-based (composite) Web services. This approach takes into account the conversational nature of composite web services and differentiates two types of web service: goal-driven and interaction-intensive. The former is goal driven and the client cares about the final goal and participates the conversation at only a few steps. While the interaction-intensive composite web service is interaction heavy, and the service and the client need to interact with each other frequently to exchange access control credentials.
引用
收藏
页码:32 / +
页数:2
相关论文
共 50 条
  • [1] Towards Process Rebuilding for Composite Web Services in Pervasive Computing
    Gao, Aiqiang
    Yang, Dongqing
    Tang, Shiwei
    Zhang, Ming
    [J]. 2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 38 - +
  • [2] Agent-based web services evolution for pervasive computing
    Liu, RM
    Chen, F
    Yang, HJ
    Chu, WC
    Lai, YB
    [J]. 11TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2004, : 726 - 731
  • [3] User Personalized Services Based on Semantic Web for Pervasive Computing
    Liu, Lizhen
    Xu, Keqiang
    Zhang, Congxia
    Rao, Min
    [J]. 2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 284 - 287
  • [4] Access Control Model for Composite Web Services
    Jiang, Huangqin
    Zhang, Hongqi
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 684 - 688
  • [5] Secure and Distributed Access Control for Dynamic Pervasive Edge Computing Services
    Liu, Lingshuang
    Huang, Cheng
    Zhu, Dan
    Liu, Dongxiao
    Ni, Jianbing
    Shen, Xuemin
    [J]. 2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 5487 - 5492
  • [6] An XML Based Access Control Architecture for Pervasive Computing
    Molla, Mohammad M.
    Madiraju, Praveen
    Malladi, Srilaxmi
    Ahamed, Sheikh Iqbal
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), VOLS 1 AND 2, 2009, : 803 - +
  • [7] APECS: A Distributed Access Control Framework for Pervasive Edge Computing Services
    Dougherty, Sean
    Tourani, Reza
    Panwar, Gaurav
    Vishwanathan, Roopa
    Misra, Satyajayant
    Srikanteswara, Srikathyayani
    [J]. CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 1405 - 1420
  • [8] Integrating Access Control Obligations in the Session Initiation Protocol for Pervasive Computing Environments
    Sharghi, Hassan
    Liscano, Ramiro
    [J]. E-TECHNOLOGIES: EMBRACING THE INTERNET OF THINGS, MCETECH 2017, 2017, 289 : 24 - 40
  • [9] Adaptation of composite services in pervasive computing environments
    Funk, Caroline
    Schultheis, Amelia
    Linnhoff-Popien, Claudia
    Mitic, Jelena
    Kuhmuench, Christoph
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, 2007, : 242 - +
  • [10] Distributed Trust Based Access Control Architecture for Pervasive Computing
    Javeed, M. Younas
    Nawaz, Sidra
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION TECHNOLOGIES & APPLICATIONS (ICUT 2009), 2009, : 464 - 469