Fine-grain, end-to-end security for web service compositions

被引:0
|
作者
Singaravelu, Lenin [1 ]
Pu, Calton [1 ]
机构
[1] Georgia Inst Technol, Coll Comp, 801 Atlantic Dr, Atlanta, GA 30332 USA
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Web service composition introduces two research challenges to end-to-end integrity and confidentiality of information flow. First, component services need the ability to selectively read or modify information flows. Second, component web services may or may not be trusted by all participants in the same degree. Existing specifications such as WS-Security provide fine-grained signatures and encryption for pair-wise interactions, but insufficient support for end-to-end security properties in open environments. Using an electronic prescription application, we illustrate the need for an enhanced framework for providing end-to-end security properties. We then describe a fine-grained, security framework, called WS-FESec, that leverages WS-Security to support flexible preservation of end-to-end integrity and confidentiality in web service compositions. Finally, we discuss WS-FESec's support for the lattice model of secure information flow and show how it can be employed to preserve end-to-end security properties in the electronic prescriptions application.
引用
收藏
页码:212 / +
页数:2
相关论文
共 50 条
  • [1] TASSA Methodology: End-to-End Testing of Web Service Compositions
    Manova, Denits A.
    Petrova-Antonova, Dessislava
    Ilieva, Sylvia
    2018 11TH INTERNATIONAL CONFERENCE ON THE QUALITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGY (QUATIC), 2018, : 264 - 267
  • [2] Privacy Against the Business Partner: Issues for Realizing End-to-End Confidentiality in Web Service Compositions
    Jensen, Meiko
    Gruschka, Nils
    PROCEEDINGS OF THE 20TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATION, 2009, : 117 - +
  • [3] The end of end-to-end security?
    Bradner, S
    IEEE SECURITY & PRIVACY, 2006, 4 (02) : 76 - 79
  • [4] End-to-end information flow security for web services orchestration
    Ben Said, Najah
    Cristescu, Ioana
    SCIENCE OF COMPUTER PROGRAMMING, 2020, 187 (187)
  • [5] An End-to-End Security Auditing Approach for Service Oriented Architectures
    Azarmi, Mehdi
    Bhargava, Bharat
    Angin, Pelin
    Ranchal, Rohit
    Ahmed, Norman
    Sinclair, Asher
    Linderman, Mark
    Ben Othmane, Lotfi
    2012 31ST INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2012), 2012, : 279 - 284
  • [6] End-to-end service
    Nave, B
    COMMUNICATIONS NEWS, 1998, 35 (06): : 64 - 65
  • [7] End-to-End Security for the IoT
    Dooley, James
    INTELLIGENT ENVIRONMENTS 2016, 2016, 21 : 606 - 606
  • [8] END-TO-END SECURITY PROTECTION
    Nazaryan, Levon
    Panaousis, Emmanouil A.
    Politis, Christos
    IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2010, 5 (01): : 85 - 90
  • [9] An end-to-end QoS and security joint management for IPTV service delivery
    Chalouf, M.A. (chalouf@labri.fr), 1600, Inderscience Enterprises Ltd. (05):
  • [10] An End-to-End Security Model for Adaptive Service-Oriented Applications
    Abdellatif, Takoua
    Bozga, Marius
    SERVICE-ORIENTED COMPUTING - ICSOC 2017 WORKSHOPS, 2018, 10797 : 43 - 54