Composable mediation for security-aware mobile services

被引:0
|
作者
Tarkoma, Sasu [1 ]
Prehofer, Christian
Sovio, Sampo
Laitinen, Pekka
机构
[1] Helsinki Univ Technol, FIN-02150 Espoo, Finland
[2] Univ Helsinki, FIN-00014 Helsinki, Finland
[3] Nokia Res Ctr, Helsinki, Finland
[4] Helsinki Inst Informat Technol, Helsinki, Finland
[5] Nokia, Irving, TX 75039 USA
关键词
12;
D O I
10.1109/MCOM.2007.382661
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This article shows how service mediation can be used to add security features to services in a mobile service platform. This base platform takes care of security, charging, and other basic functions, which are then configured for services at runtime using a pluggable mediator framework. Service providers can focus on content, and thus leverage the signaling and mediation capabilities of the core platform. Mediators add specific functionality to a service, and are a specific form of service composition and selection. We examine how security technologies for authentication and authorization are integrated by mediators into a single policy infrastructure with a homogeneous interface for services. We consider here the Web services SAML and the 3GPP GBA security bootstrapping standard in the context of mobile services. We give an example using a video on demand service, and discuss how and when security concerns of services can be transferred from the services to mediators.
引用
收藏
页码:58 / 65
页数:8
相关论文
共 50 条
  • [1] On the verification of security-aware E-services
    Ranise, Silvio
    [J]. JOURNAL OF SYMBOLIC COMPUTATION, 2012, 47 (09) : 1066 - 1088
  • [2] Security-aware job allocation in mobile cloud computing
    Nawrocki, Piotr
    Pajor, Jakub
    Sniezynski, Bartlomiej
    Kolodziej, Joanna
    [J]. 21ST IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2021), 2021, : 713 - 719
  • [3] A formal model for security-aware dynamic web services composition
    Xu, Dong-Hong
    Qi, Yong
    Hou, Di
    Chen, Ying
    Liu, Liang
    [J]. ICCSA 2007: PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND APPLICATIONS, 2007, : 139 - +
  • [4] Security-Aware Resource Allocation for Mobile Cloud Computing Systems
    Liu, Yanchen
    Lee, Myung J.
    [J]. 24TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS ICCCN 2015, 2015,
  • [5] Composing security-aware software
    Khan, KM
    Han, J
    [J]. IEEE SOFTWARE, 2002, 19 (01) : 34 - +
  • [6] Security-aware program transformations
    Bartoletti, M
    Degano, P
    Ferrari, GL
    [J]. THEORETICAL COMPUTER SCIENCE, PROCEEDINGS, 2003, 2841 : 355 - 368
  • [7] Security-aware Service Migration for Tactical Mobile Micro-Clouds
    Ciftcioglu, Ertugrul N.
    Chan, Kevin S.
    Urgaonkar, Rahul
    Wang, Shiqiang
    He, Ting
    [J]. 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 1058 - 1063
  • [8] Composable context aware services
    Yavatkar, Raj
    Campbell, Andrew
    Krishnamurthy, Lakshman
    Abdelzaher, Tarek
    [J]. IEEE NETWORK, 2008, 22 (04): : 4 - 5
  • [9] On security-aware transmission scheduling
    He, Ting
    Agaskar, Ameya
    Tong, Lang
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-12, 2008, : 1681 - +
  • [10] Modeling adaptive security-aware task allocation in mobile cloud computing
    Nawrocki, Piotr
    Pajor, Jakub
    Sniezynski, Bartlomiej
    Kolodziej, Joanna
    [J]. SIMULATION MODELLING PRACTICE AND THEORY, 2022, 116