Security-by-Contract for Web Services or How to Trade Credentials for Services∗
نویسندگان
چکیده
The classical approach to access control of Web Services is to present a number of credentials for the access to a service and possibly negotiate their disclosure using a suitable negotiation protocol and a policy to protect them. In practice a “Web Service” is not really a single service but rather a set of services that can be accessed only through a suitable conversation. Further, in real-life we are often willing to trade the disclosure of personal attributes (frequent flyer number, car plate or AAA membership etc.) in change of additional services and only in a particular order. In this paper we propose a novel negotiation framework where services, needed credentials, and behavioral constraints on the disclosure of privileges are bundled together and that clients and servers have a hierarchy of preferences among the different bundles. While the protocol supports arbitrary negotiation strategies we sketch two concrete strategies (one for the client and one for the service provider) that make it possible to successfully complete a negotiation when dealing with a cooperative partner and to resist attacks by malicious agent to ”vacuum-clean” the preference policy of the honest participant.
منابع مشابه
A model for specification, composition and verification of access control policies and its application to web services
Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...
متن کاملSecurity Annotation for DAML Web Services
The focus of this paper is developing ontologies that can be used to annotate web services represented by DAML-S. We propose several security-related ontologies that are designed to represent security standards such as XML Signatures in terms of their characteristics like credentials, mechanisms supported, notations used, etc. These ontologies are used to describe security properties of web ser...
متن کاملImage flip CAPTCHA
The massive and automated access to Web resources through robots has made it essential for Web service providers to make some conclusion about whether the "user" is a human or a robot. A Human Interaction Proof (HIP) like Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) offers a way to make such a distinction. CAPTCHA is a reverse Turing test used by Web serv...
متن کاملCan we take this off - line ? Credentials for Web Services supported nomadic applications †
Devices supporting nomadic applications are assumed to be able to take advantage of the capabilities of surrounding devices. This paper discusses the access control requirements of such ad-hoc federations of communicating devices, some of which may be administered by a different authority, and illustrates how such scenarios would be handled in the Web Services Security and the framework propose...
متن کاملCredEx: User-centric Credential Selection and Management for Grids
User authentication is a crucial security component for most computing systems. Yet different systems rely on different authentication mechanisms based on their particular security needs. Specifically, systems such as independently-managed Grids vary with regard to the type of credential or security token used to prove the user's identity (username/password, X.509 certificates and Kerberos tick...
متن کامل