Semantics-Aware Perimeter Protection
نویسندگان
چکیده
Web services security is becoming a critical concern for any organization adopting the XML-based Web services approach to application integration. While many access control techniques for Web services are becoming available, several issues still need to be solved in order to correctly split the burden of securing Web services between the perimetral and the service level. In this paper, a technique is presented able to make perimetral defences semantics-aware. Application-level semanticsaware firewalls enforce filtering rules directly on SOAP messages based on the nature of the services they request. Our semantics-aware firewalls rules are written using a flexible XML-based syntax that allows sharing metadata concepts with service level access control policies, supporting complex security policies that integrate perimetral defences with access control. Moreover, they can be quickly integrated into organizations’ existing infrastructure, deployed rapidly and scaled as needed. Also, they integrate easily with existing infrastructure and can be operated by current staff, potentially achieving a low total cost of ownership with respect to service level solutions.
منابع مشابه
POSTER: Semantics-Aware Rule Recommendation and Enforcement for Event Paths
With users’ increasing awareness of security and privacy issues, Android’s permission mechanism and other existing methods fall short to provide effective protection over user data. This paper presents SARRE, a Semantics-Aware Rule Recommendation and Enforcement system to detect critical information outflows and prevent information leakage. SARRE leverages runtime monitoring and statistical ana...
متن کاملA Novel Protection Guaranteed, Quality of Transmission Aware Routing and Wavelength Assignment Algorithm for All-optical Networks
Transparent All Optical Networks carry huge traffic and any link failure can cause the loss of gigabits of data; hence protection and its guarantee becomes necessary at the time of failure. Many protection schemes were presented in the literature, but none of them speaks about protection guarantee. Also, in all optical networks, due to absence of regeneration capabilities, the physical layer i...
متن کاملAn Energy-aware Greedy Perimeter Stateless Routing Protocol for Mobile Ad hoc Networks
The high-level contribution of this paper is an energy-aware version of the well-known position-based Greedy Perimeter Stateless Routing (GPSR) protocol for mobile ad hoc networks (MANETs). In the proposed energy-aware GPSR protocol, referred to as E-GPSR, we optimize the greedy forwarding mode as follows: a forwarding node first determines a candidate set of neighbor nodes – the nodes that lie...
متن کاملSafety Management System Protection against Acts of Unlawfull Interference of Civil Airport
This paper deals with the methodology useable in the risk assessment of civil airport protection against acts of unlawful interference. Attention is focused on analyzing the current state of the airport perimeter and an analysis of risk assessment procedures in the safety management of civil airports.
متن کاملSensitive Semantics-Aware Personality Cloaking on Road-Network Environment
Recently, several cloaking methods based on K-anonymity and L-diversity has been proposed to protect the user’s location privacy for Location-based Services (LBS). Considering that a cloaking region could contain some semantic places, which can easily endanger the user’s privacy, it is not safe to cloak the user’s location only consider Kanonymity and L-diversity. This paper presents a novel pe...
متن کامل