Title of article :
A Model for Specification, Composition and Verification of Access Control Policies and Its Application toWeb Services
Author/Authors :
Derakhshandeh, Zahra Sheikhbahaee University - Department of Computer Engineering, ايران , Tork Ladani, Behrouz university of isfahan - Department of Computer Engineering, اصفهان, ايران
From page :
103
To page :
120
Abstract :
Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verication and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new independent formal model called Constrained Policy Graph (CPG) for specification of ACPs and their composition as well as verification of conict or incompatibility among the ACPs is represented. It is shown how CPG can be used in modeling and verification of web service composition ACPs. Also the application of CPG for modeling policies in BPEL processes -as the most common composition method for web services- is illustrated.
Keywords :
Access Control Policy (ACP) , Verification , Web Service Composition , BPEL , Constrained Policy Graph (CPG)
Journal title :
ISeCure - The ISC International Journal of Information Security
Journal title :
ISeCure - The ISC International Journal of Information Security
Record number :
2542712
Link To Document :
بازگشت