From Business Process Choreography to Authorization Policies

نویسندگان

  • Philip Robinson
  • Florian Kerschbaum
  • Andreas Schaad
چکیده

A choreography specifies the interactions between the resources of multiple collaborating parties at design time. The runtime management of authorization policies in order to support such a specification is however tedious for administrators to manually handle. By compiling the choreography into enhanced authorization policies, we are able to automatically derive the minimal authorizations required for collaboration, as well as enable and disable the authorizations in a just-in-time manner that matches the control flow described in the choreography. We have evaluated the advantage of this utility in a collaborative engineering

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Selecting Web Services for Choreography Implementation: Compatibility Checking Approach with Access Control

Nowadays, Web services technologies are adequate for designing and implementing complex inter-enterprise business applications. Web services choreography defines the required behaviors of Web services which participate in implementing such applications with their interactions through message exchanges. The designer of the application collects the Web services that implement the defined choreogr...

متن کامل

Security Analysis for Web ServicesCompositions

As more organizations adopt Web services for increasingly sensitive, mission-critical data the potential impact of breaches of Web services increases both for individuals and organizations. Increasing impacts can result in a worsening of the risk environment for all parties. Web services security and auditing is therefore an important concern. The current trend toward representing Web services ...

متن کامل

An Access Control System for Business Processes for Web Services

Web Services and Business Processes for Web Services are the new paradigms for the lightweight integration of business from different enterprises. Whereas the security and access control policies for basic web services and distributed systems are well studied and almost standardized, there is not yet a comprehensive proposal for an access control architecture for business processes. The major d...

متن کامل

Authorization models for secure information sharing: a survey and research agenda

This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...

متن کامل

Choreography-Based Design of Business Collaborations

We define choreography-based design as a design approach in which a business process for a business collaboration (or choreography) is established by the stakeholders in the collaboration. Subsequently, the stakeholders adapt their internal business processes to the established choreography, to allow successful collaboration. To assist in such a design approach, this paper presents techniques t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006