Reliable and Adaptable Security Engineering for Database-Web Services

نویسندگان

  • Martin Wimmer
  • Daniela Eberhardt
  • Pia Ehrnlechner
  • Alfons Kemper
چکیده

The situation in engineering security for Web services that access databases is as follows: On the one hand, specifications like WSSecurity are concerned with the security management for Web services, while on the other hand there exist well established mechanisms for access control in the area of commercial database systems. In handling security for services that rely on database systems, two extreme approaches can currently be observed: The more database-centric one, where the access control decisions are left to the DBMS, and the service-centric authorization approach. The service-centric approach requires a Web service to run under control of the database system provider as operations like queries and updates have to be executed with comprehensive privileges. Authorization has to be enforced by the service itself. In case access control policies of a service are defined independently with regard to the database policies, authorization mismatches are likely to be induced. In our new approach we bridge this gap between DBMS authorization and access control of Web services by supporting reliable and adaptable access control engineering. The policies of the DBMS constitute the basis for the authorization of Web services. These are therefore automatically extracted before they are refined by additional conditions. As a final step, it must be verified that service policies do not grant more permissions than database policies do, thus ensuring reliable service execution.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An adaptable security manager for real-time transactions

The rising demand for real-time services over the network such as web-based information services requires new approaches for balancing competing demands on limited resources. The BeeHive database system proposes a novel solution to this need by the use of adap-tive real-time, fault tolerance, quality of service and security services based upon rules embedded in individual objects 1]. These rule...

متن کامل

Adaptable Transaction Processing in the Web Services Domain

The advent of Web Services technologies both demands interoperability and adaptability of various transaction processing models, and provides a solid basis for this goal. In this paper we first give an overview of the problem domain and analyze the state-of-the-art Web transaction protocols, the Business Transaction Protocol (BTP) and Web Services Coordination and Transactions (WS-C/T), and the...

متن کامل

Engineering Secure Adaptable Web Services Compositions

Service-oriented architecture defines a paradigm for building applications by assembling autonomous components such as web services to create web service compositions. Web services are executed in complex contexts where unforeseen events may compromise the security of the web services composition. If such compositions perform critical functions, prompt action may be required as new security thr...

متن کامل

Efficient access control for service-oriented IT infrastructures: enabling secure distributed service compositions

Web services represent the emerging technology for many enterprise application architectures. Due to widely accepted standards for the specification of service interfaces and communication protocols, they constitute the preferred approach for integrating resources and legacy systems, easing the reusability of modules and the reconfiguration of higher-order business processes. Furthermore, inter...

متن کامل

Ontology Analysis for the Semantic Web

Ontology engineering will become an increasingly important discipline as ontologies scale up on the semantic web. The enabling mechanism for the semantic web will undoubtedly lie in the construction of ontologies to address the diversity of web services. For such a dynamic environment to be realized, the underlying ontological infrastructure will need to be extremely adaptable and reliable (Eve...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004