Instance-Level Security Management in

نویسندگان

  • Dacheng Zhang
  • Jianxin Li
  • Jinpeng Huai
چکیده

By using Web services, people can generate flexible business processes whose activities are scattered across different organizations, with the services carrying out the activities bound at run-time. We refer to an execution of a Web service based automatic business process as a business session (multi-party session). A business session consists of multiple Web service instances which are called session partners. Here, we refer to a Web service instance as being a stateful execution of the Web service. In [8], we investigate the security issues related to business sessions, and demonstrate that security mechanisms are needed at the instance level to help session partners generate a reasonable trust relationship. To achieve this objective, an instance-level authentication mechanism is proposed. Experimental systems are integrated with both the GT4 and CROWN Grid infrastructures, and comprehensive experimentation is conducted to evaluate our authentication mechanism. Additionally, we design a policy-based authorization mechanism based on our instance-level authentication mechanism to further support trustworthy and flexible collaboration among session partners involved in the same business session. This mechanism allows an instance invoker to dynamically assign fine-grained access control policies for the new invoked instance so as to grant other session partners the necessary permissions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RFID-based decision support within maintenance management of urban tunnel systems

Efficiently, tracking information related to components, materials and equipment from the production/construction phase to operation and maintenance is a challenge in the industries. The industry environment is a natural fit for generating and utilizing instance-level data for decision support. Advanced electronic identification and data storage technologies e.g. radio frequency identification ...

متن کامل

RFID-based decision support within maintenance management of urban tunnel systems

Efficiently, tracking information related to components, materials and equipment from the production/construction phase to operation and maintenance is a challenge in the industries. The industry environment is a natural fit for generating and utilizing instance-level data for decision support. Advanced electronic identification and data storage technologies e.g. radio frequency identification ...

متن کامل

Comparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis

The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...

متن کامل

Comparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis

The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...

متن کامل

Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting

We construct an identity-based encryption (IBE) scheme that is tightly secure in a very strong sense. Specifically, we consider a setting with many instances of the scheme and many encryptions per instance. In this setting, we reduce the security of our scheme to a variant of a simple assumption used for a similar purpose by Chen and Wee (Crypto 2013). The security loss of our reduction is O(k)...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006