An access control model for web services in business process

被引:0
|
作者
Liu, P [1 ]
Chen, Z [1 ]
机构
[1] Peking Univ, Informat Secur Lab, Dept Comp Sci, Beijing 100871, Peoples R China
来源
IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE (WI 2004), PROCEEDINGS | 2004年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Business process describes a set of services that span enterprise boundaries and are provided by enterprises that see each other as partners. Web services is widely accepted and adopted to construct business process. Web services are built in exposed environment and open to security threats. When a web service contained in a business process is authorized to illegal users, it will cause economic loss of the service provider. Although there exist some standards for security of Web services and access control for services in distributed systems are well studied, there is a lack of comprehensive approach in access control for web services, especially in business process. In this paper, an extended RBAC model, called WS-RBAC, is proposed to secure web services in business process. The model takes web services in business process as protected objects and extends the classical RBAC model. Next, The software architecture of WS-RABC is presented. This paper also presents how to specify business process in the model and the authorization constraints of WS-RBAC based on WS-Policy.
引用
收藏
页码:292 / 298
页数:7
相关论文
共 50 条
  • [21] Access control architecture for web services
    Yuan, SJ
    Hu, YF
    GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 1004 - 1007
  • [22] Interactive access control for Web Services
    Koshutanski, H
    Massacci, F
    SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 151 - 166
  • [23] The Proviado Access Control Model for Business Process Monitoring Components
    Reichert, Manfred
    Bassil, Sarita
    Bobrik, Ralph
    Bauer, Thomas
    ENTERPRISE MODELLING AND INFORMATION SYSTEMS ARCHITECTURES-AN INTERNATIONAL JOURNAL, 2010, 5 (03): : 64 - 88
  • [24] Web services composition for business process automation
    Fang, Yuefeng
    Gao, Kun
    Wang, Xiaoyong
    Li, Jifang
    PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON E-ACTIVITIES: E-ACTIVITIES: NETWORKING THE WORLD, 2007, : 293 - +
  • [25] A double access control model for web services based information system
    Chen, Xueqin
    Wu, Huizhong
    Zhu, Yaoqin
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 1045 - 1050
  • [26] A trust and context aware access control model for web services conversations
    Coetzeel, Marijke
    Eloff, J. H. P.
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2007, 4657 : 115 - +
  • [27] An Implementation Model for Privacy Aware Access Control in Web Services Environment
    Bhatia, Rekha
    Singh, Manpreet
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT, ICT4SD 2015, VOL 1, 2016, 408 : 475 - 484
  • [28] Trust-Compensation-Based Access Control Model for Web Services
    Yan Danfeng
    Sun Jing
    Zhang Liying
    Yang Fangchun
    CHINA COMMUNICATIONS, 2012, 9 (12) : 8 - 21
  • [29] Access control scheme for web services (ACSWS)
    Elsheikh, Selma
    2008 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING, VOLS 1-3, 2008, : 854 - 858
  • [30] A role based access control for Web services
    Wonohoesodo, R
    Tari, Z
    2004 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, 2004, : 49 - 56