A service-oriented approach to security - Concepts and issues

被引:4
|
作者
Bertino, Elisa [1 ]
Martino, Lorenzo D. [1 ]
机构
[1] Purdue Univ, W Lafayette, IN 47907 USA
关键词
D O I
10.1109/ISADS.2007.7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Various mechanisms for authentication and access control have been developed over time. Operating systems and DBMS implement such mechanisms and support quite rich access control models. A major limitation, however, of such mechanisms is that they are not extensible; thus whenever an application domain requires more sophisticated access controls or authentication, the applications must include logics for such controls. Such an approach leads to increased costs in application development and maintenance. For these reasons, models and mechanisms apt to separate those functions have emerged, also fostered by XML and Web services. At the same time, the need to drive the behaviour of security through clearly stated and machine-processable policies has fostered the development of various policy models and policy management mechanisms. A policy-based approach enhances flexibility, and reduces the application development costs. Changes to the access control or authentication requirements simply entail modifying the policies, without requiring changes to the applications. It is thus clear that an important approach to the problem of security is represented by the development of policy-based security services providing all functions for security management relevant to applications. Such an approach is particularly promising for applications organized according to the Service Oriented (SOA) paradigm. In this paper we discuss basic concepts of such an approach to security and we present a reference architectural framework. We discuss three relevant classes of security services, namely digital identity management services, authentication services, access control services, and outline research directions for each such class.
引用
收藏
页码:7 / +
页数:2
相关论文
共 50 条
  • [21] Privacy Issues in Middleware for Service-oriented Applications
    Hung, Patrick C. K.
    2007 11TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS, 2007, : 52 - 52
  • [22] Security framework for dynamic service-oriented IT systems
    Kolaczek, Grzegorz
    Mizera-Pietraszko, Jolanta
    JOURNAL OF INFORMATION AND TELECOMMUNICATION, 2018, 2 (04) : 428 - 448
  • [23] Security Policy Conflicts in Service-oriented Systems
    Brodecki, Bartosz
    Szychowiak, Michal
    Sasak, Piotr
    NEW GENERATION COMPUTING, 2012, 30 (2-3) : 215 - 240
  • [24] Applying Security within a Service-Oriented Architecture
    Primost, Stephen
    INFORMATION SECURITY JOURNAL, 2008, 17 (01): : 26 - 32
  • [25] Developing a Security Robot in Service-Oriented Architecture
    Chen, Yinong
    Abhyankar, S.
    Xu, L.
    Tsai, W. T.
    Garcia-Acosta, Marcos
    12TH IEEE INTERNATIONAL WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2008, : 106 - +
  • [26] Security Policy Conflicts in Service-oriented Systems
    Bartosz Brodecki
    Michał Szychowiak
    Piotr Sasak
    New Generation Computing, 2012, 30 : 215 - 240
  • [27] Integration of a Security Product in Service-oriented Architecture
    Dikanski, Aleksander
    Emig, Christian
    Abeck, Sebastian
    2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 1 - 7
  • [28] Security requirements for a semantic service-oriented architecture
    Duerbeck, Stefan
    Schillinger, Rolf
    Kolter, Jan
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 366 - +
  • [29] An Overview of Service-Oriented Computing Challenges and Issues
    Corradini, Flavio
    De Angelis, Francesco
    Fani, Daniele
    Polini, Andrea
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1 (WEBIST), 2016, : 231 - 238
  • [30] A new approach for service-oriented architecture
    Talaei-Khoei, A
    Sheriffian, AH
    Akbari, MK
    Verdom, JF
    Enabling Technologies for the New Knowledge Society, 2005, : 459 - 470