On Evolving Organizational Models without Loosing Control on Authorization Constraints in Web Service Orchestrations
نویسندگان
چکیده
Providing adequate access control is crucial for the proper execution of any Web Service (WS) orchestration. Typically, access rules and authorization constraints are defined for a WS orchestration and are resolved over an organizational model at runtime in order to find authorized users to perform orchestration tasks. As known from many practical studies, organizational models are frequently subject to change (e.g., outsourcing or restructuring). Although the effects of organizational changes on access rules have been investigated so far, their effects on authorization constraints remain still completely unclear, albeit violating authorization constraints might lead to severe problems such as security holes. In this paper, we systematically investigate the effects of organizational changes on authorization constraints and propose different strategies to cope with possible violations. We evaluate our results along the most common types of authorization constraints and discuss the impact of the selected implementation choice.
منابع مشابه
TWSO - Transactional Web Service Orchestrations
There is a need for transactional processing in the Web service world. Software industry responded to this need by publishing a couple of Web service transaction proposals that are quite alike. However, these proposals define basically only communication protocols that indirectly implement advanced transaction models. The proposals lack accurate usage suggestions and the rather obvious question...
متن کاملQoS-Based web service composition based on genetic algorithm
Quality of service (QoS) is an important issue in the design and management of web service composition. QoS in web services consists of various non-functional factors, such as execution cost, execution time, availability, successful execution rate, and security. In recent years, the number of available web services has proliferated, and then offered the same services increasingly. The same web ...
متن کاملTemporal Conformance of Federated Choreographies
Web service composition is a new way for implementing business processes. In particular, a choreography supportsmodeling and enactment of interorganizational business processes consisting of autonomous organizations. Temporal constraints are important quality criteria. We propose a technique for modeling temporal constraints in choreographies and orchestrations, checking whether the orchestrati...
متن کاملExtended Role Based Access Control with Blob Service on Cloud
Role-based access control (RBAC) models have generated a great interest in the security community as a powerful and generalized approach to security management and ability to model organizational structure and their capability to reduce administrative expenses. In this paper, we highlight the drawbacks of latest developed RBAC models in terms of access control and authorization and later provid...
متن کاملTowards Business Driven Web Service Authorization - Project Experiences in German University Administrations
The management of web service access is a great challenge primarily in organizations with a high number of web services and various sorts of access authorization. Both organizational and technical hurdles have to be overcome. Technical barriers arise by different security requirements across various systems under consideration of economic conditions. Complex service interaction may be mentioned...
متن کامل