From Business Process Choreography to Authorization Policies
نویسندگان
چکیده
A choreography specifies the interactions between the resources of multiple collaborating parties at design time. The runtime management of authorization policies in order to support such a specification is however tedious for administrators to manually handle. By compiling the choreography into enhanced authorization policies, we are able to automatically derive the minimal authorizations required for collaboration, as well as enable and disable the authorizations in a just-in-time manner that matches the control flow described in the choreography. We have evaluated the advantage of this utility in a collaborative engineering
منابع مشابه
Selecting Web Services for Choreography Implementation: Compatibility Checking Approach with Access Control
Nowadays, Web services technologies are adequate for designing and implementing complex inter-enterprise business applications. Web services choreography defines the required behaviors of Web services which participate in implementing such applications with their interactions through message exchanges. The designer of the application collects the Web services that implement the defined choreogr...
متن کاملSecurity Analysis for Web ServicesCompositions
As more organizations adopt Web services for increasingly sensitive, mission-critical data the potential impact of breaches of Web services increases both for individuals and organizations. Increasing impacts can result in a worsening of the risk environment for all parties. Web services security and auditing is therefore an important concern. The current trend toward representing Web services ...
متن کاملAn Access Control System for Business Processes for Web Services
Web Services and Business Processes for Web Services are the new paradigms for the lightweight integration of business from different enterprises. Whereas the security and access control policies for basic web services and distributed systems are well studied and almost standardized, there is not yet a comprehensive proposal for an access control architecture for business processes. The major d...
متن کاملAuthorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کاملChoreography-Based Design of Business Collaborations
We define choreography-based design as a design approach in which a business process for a business collaboration (or choreography) is established by the stakeholders in the collaboration. Subsequently, the stakeholders adapt their internal business processes to the established choreography, to allow successful collaboration. To assist in such a design approach, this paper presents techniques t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006