A new method for consistency of access control in web services

被引:0
|
作者
Bagheri, Esmaeil [1 ]
Babaei, Saeid [1 ]
Khayyambashi, Mohammad Reza [2 ]
机构
[1] Islamic Azad Univ Najafabad, Young Researchers Club, Najafabad, Iran
[2] Univ Isfahan, Fac Engn, Dept Comp, Esfahan, Iran
关键词
Authorization; Access Control; Web service;
D O I
10.1109/ICCSIT.2009.5234486
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web services provide easy access to functions or data with acceptable outlay for organizations. Web services widely cooperate and produce big distributed programs and invite users for enter and access to integrate system, its not important that this persons who are. Users can be good or bad customers or partners that want damage system or its data. So that suppression of unallowable accesses and security is one of important problems to use web services. One of existent security problems in web services is infirmity of access control systems. Different organizations have different roles so attribute or roles of users mapping between different systems is difficult. Use of methods regimentation, trust, publishing roles based on jobs, roles local mapping, role based access control and attachment of assertions with requests, is presented a method for obviation this problem and improving access control in web services.
引用
收藏
页码:567 / +
页数:2
相关论文
共 50 条
  • [1] Access control for semantic web services
    Agarwal, S
    Sprick, B
    IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, 2004, : 770 - 773
  • [2] Access control on the composition of Web services
    Zhu, Junqiang
    Zhou, Yu
    Tong, Weiqin
    INTERNATIONAL CONFERENCE ON NEXT GENERATION WEB SERVICES PRACTICES, PROCEEDINGS, 2006, : 89 - +
  • [3] Web services in access, control, and pricing
    Zhang, Liang-Jie
    INTERNATIONAL JOURNAL OF WEB SERVICES RESEARCH, 2006, 3 (03) : I - I
  • [4] Scalable access control for web services
    Swamynathan, Gayatri
    Close, Tyler
    Banerjee, Sujata
    McGeer, Rick
    Zhao, Ben
    Almeroth, Kevin
    C5 2007: FIFTH INTERNATIONAL CONFERENCE ON CREATING, CONNECTING AND COLLABORATING THROUGH COMPUTING, PROCEEDINGS, 2007, : 93 - +
  • [5] Semantic Access Control for Web Services
    Liu, Miao
    Xie, Dongqing
    Li, Peng
    Zhang, Xunlai
    Tang, Chunming
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 55 - +
  • [6] Access control architecture for web services
    Yuan, SJ
    Hu, YF
    GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 1004 - 1007
  • [7] Interactive access control for Web Services
    Koshutanski, H
    Massacci, F
    SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 151 - 166
  • [8] A flexible access control model for Web services
    Bertino, E
    Squicciarini, AC
    FLEXIBLE QUERY ANSWERING SYSTEMS, PROCEEDINGS, 2004, 3055 : 13 - 16
  • [9] Access control scheme for web services (ACSWS)
    Elsheikh, Selma
    2008 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING, VOLS 1-3, 2008, : 854 - 858
  • [10] Access Control Model for Composite Web Services
    Jiang, Huangqin
    Zhang, Hongqi
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 684 - 688