Fine-grain, end-to-end security for web service compositions

被引:0
|
作者
Singaravelu, Lenin [1 ]
Pu, Calton [1 ]
机构
[1] Georgia Inst Technol, Coll Comp, 801 Atlantic Dr, Atlanta, GA 30332 USA
来源
2007 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS | 2007年
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Web service composition introduces two research challenges to end-to-end integrity and confidentiality of information flow. First, component services need the ability to selectively read or modify information flows. Second, component web services may or may not be trusted by all participants in the same degree. Existing specifications such as WS-Security provide fine-grained signatures and encryption for pair-wise interactions, but insufficient support for end-to-end security properties in open environments. Using an electronic prescription application, we illustrate the need for an enhanced framework for providing end-to-end security properties. We then describe a fine-grained, security framework, called WS-FESec, that leverages WS-Security to support flexible preservation of end-to-end integrity and confidentiality in web service compositions. Finally, we discuss WS-FESec's support for the lattice model of secure information flow and show how it can be employed to preserve end-to-end security properties in the electronic prescriptions application.
引用
收藏
页码:212 / +
页数:2
相关论文
共 50 条
  • [11] On Web quality of service: Approaches to measurement of End-To-End Response Time
    Tsykin, M
    NETWORKING - ICN 2001, PART II, PROCEEDINGS, 2001, 2094 : 291 - 301
  • [12] Measuring end-to-end quality of a news-on-demand Web service
    Arias, JR
    Suárez, FJ
    García, DF
    Marín, JI
    WEB ENGINEERING, PROCEEDINGS, 2003, 2722 : 271 - 274
  • [13] End-to-End Web Service Recommendations by Extending Collaborative Topic Regression
    Bai, Bing
    Fan, Yushun
    Tan, Wei
    Zhang, Jia
    Huang, Keman
    Bi, Jing
    INTERNATIONAL JOURNAL OF WEB SERVICES RESEARCH, 2018, 15 (01) : 89 - 112
  • [14] Service selection algorithms for Web services with end-to-end QoS constraints
    Yu T.
    Lin K.-J.
    Information Systems and e-Business Management, 2005, 3 (2) : 103 - 126
  • [15] Service selection algorithms for Web services with end-to-end QoS constraints
    Yu, T
    Lin, KJ
    CEC 2004: IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY, PROCEEDINGS, 2004, : 129 - 136
  • [16] Optimization of end-to-end service
    Shao, Bi-Lin
    Zhang, Zhi-Xia
    Xi'an Jianzhu Keji Daxue Xuebao/Journal of Xi'an University of Architecture and Technology, 2004, 36 (04):
  • [17] End-To-End Security for Video Distribution
    Boho, Andras
    Van Wallendael, Glenn
    Dooms, Ann
    De Cock, Jan
    Braeckman, Geert
    Schelkens, Peter
    Preneel, Bart
    Van de Walle, Rik
    IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) : 97 - 107
  • [18] Synthesising End-to-End Security Protocols
    Thevathayan, Charles
    Bertok, Peter
    Fernandez, George
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 440 - 447
  • [19] A transparent end-to-end security solution
    Thomas, S
    Misra, D
    Eswari, PRL
    Babu, NSC
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 336 - 339
  • [20] An end-to-end security solution for SCTP
    Lindskog, Stefan
    Brunstrom, Anna
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 526 - +