Profiles for conveying the secure communication requirements of Web services
نویسندگان
چکیده
The lack of a single authority in the Grid environment is perhaps the biggest source of security and interoperability challenges faced by Grid systems designers. A strong commitment to meaningful, interoperable security is crucial for fostering Grid adoption and buy-in. The issues of securityinteroperability are twofold: (a) grids require federation of distinct trust and security domains, and (b) grid participants need to convey and discover their secure communication requirements. This paper presents two new OGF security profiles that address this latter issue. The Secure Communication Profile 1.0 is a refinement of the WS-SecurityPolicy specification. The goals of this profile are to impose more restrictive conformance requirements on the WS-Security mechanisms described by WS-SecurityPolicy assertions, to facilitate key distribution, and to profile normative “well-known” policy documents that identify commonly-used security mechanisms. The Secure Addressing Profile 1.0 refines the WS-Addressing specification in order to profile the inclusion of security policy within Endpoint References (EPRs). This approach of conveying security policy within EPRs is well-suited to the Grid paradigms of stateful Web service resources and factory patterns.
منابع مشابه
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملA model for specification, composition and verification of access control policies and its application to web services
Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...
متن کاملAn Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks
Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...
متن کاملSemantic Authorization of Mobile Web Services
With the recent developments in the cellular world, the high-end mobile phones and PDAs are becoming pervasive and are being used in different application domains. Integration of the web services and cellular domains lead to the new application domain, mobile web services. Mobile web service provisioning offers many of its applications in domains like e-commerce, collaborative applications, soc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Concurrency and Computation: Practice and Experience
دوره 21 شماره
صفحات -
تاریخ انتشار 2009