UDDI Access Control for the Extended Enterprise

نویسندگان

  • Robert Steele
  • Juan Dai
چکیده

An Extended Enterprise is comprised of not only the enterprise itself but also the enterprise's suppliers, clients and other associated organizations. The Extended Enterprise, in response to business needs and decisions, can dynamically alter these interrelationships, for example possibly swapping out some partners and swapping in others. Web services are an appropriate technology choice to facilitate the Extended Enterprise via supporting interoperability. Furthermore, the UDD! Web service standard and in particular a private UDDI registry can enable partner organizations to lookup and discover services of their new partners. As such a private UDDI registry is well suited to allowing potentially regularly changing business partners in an Extended Enterprise to determine how to interoperate with each other. However, different partners, depending on their role, should see a different set of the available services in an enterprises' private UDD! registry. This is for security, business confidentiality and simplicity purposes. As such in this paper we propose how a role-based access control scheme for a private UDD! registry can be utilized to support the Extended Enterprise. Abstract:

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

WSRP, SOA and UDDI

Web Services for Remote Portlets (WSRP) provide solutions for implementation of lightweight Service Oriented Architecture (SOA). UDDI extension for WSRP enables the discovery and access to user facing web services provided by business partners while eliminating the need to design local user facing portlets. Most importantly, the remote portlets can be updated by web service providers from their...

متن کامل

Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

متن کامل

Enhancing UDDI to Support Transparent Access and Multiobjective QoS for Web Services

As more and more web services appearing on the Internet, how to locate an appropriate service has become a research challenge and an emerging enterprise request. In this paper, we present a transparent web service acquisition system by enhancing the functionality of UDDI to support various service requirements. With this system, a service requester can transparently locate a service which meets...

متن کامل

An Extended Role-based Access Control Model for Enterprise Systems and Web Services

This thesis intends to develop application-level access control models to address several major security issues in enterprise environments. The first goal is to provide simple and efficient authorization specifications to reduce the complexity of security management. The second goal is to provide dynamic access control for Web service applications. The third goal is to provide an access control...

متن کامل

Web Services Composition for Business Process Automation

Composition of web services has received much interest to support business-to-business or enterprise application integration. Current standards to formalize the specification of web services, their flow composition and execution are introduced in this paper. Web services composition includes static and dynamic composition. We thoroughly introduced the static composition based on BPEL4WS through...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005