Consolidating the Access Control of Composite Applications and Workflows
نویسندگان
چکیده
The need for enterprise application integration projects leads to complex composite applications. For the sake of security and efficiency, consolidated access control policies for composite applications should be provided. Such a policy is based on the policies of the corresponding autonomous sub-applications and has the following properties: On the one hand, it needs to be as restrictive as possible to block requests which do not comply with the integrated sub-applications’ policies. Thereby, unsuccessful executions of requests are prevented at an early stage. On the other hand, the composite policy must grant all necessary privileges in order to make the intended functionality available to legitimate users. In this paper, we present our formal model and respective algorithmic solutions for consolidating the access control of composite applications. The generated policies conform to the presented requirements of the least privileges paradigm and, thus, allow to revise and optimize the access control of composite applications. We demonstrate this by means of Web service workflows that constitute the state of the art for the realization of business processes.
منابع مشابه
Efficient Access Control for Composite Applications
Composite applications rely on further sub-applications – also called sub-activities in the following – to implement their functionality. There are numerous examples including quite simple Web applications as well as large scale enterprise resource planning (ERP) systems that interact with database backends. Also, business processes that are realized as Web service workflows represent complex c...
متن کاملDevelopment of Fiber Reinforced SCM for Sustainable Construction
The sustainability of the built environment is increasingly coming to the forefront of infrastructure design and maintenance decisions. To address this, development of a new class of more sustainable cement-based materials is needed. Fiber reinforced self-consolidating mortar (FRSCM) was developed by optimizing the micromechanical parameters, which control composite properties in the hardened s...
متن کاملA Clustering Approach to Scientific Workflow Scheduling on the Cloud with Deadline and Cost Constraints
One of the main features of High Throughput Computing systems is the availability of high power processing resources. Cloud Computing systems can offer these features through concepts like Pay-Per-Use and Quality of Service (QoS) over the Internet. Many applications in Cloud computing are represented by workflows. Quality of Service is one of the most important challenges in the context of sche...
متن کاملOptimized Workflow Authorization in Service Oriented Architectures
Complex business processes are usually realized by specifying the integration and interaction of smaller modular software components. For example, hitherto monolithic enterprise resource planning systems (ERP) are decomposed into Web services which are then again orchestrated in terms of Web service workflows, bringing about higher levels of flexibility and adaptability. In general, such servic...
متن کاملEfficient access control for service-oriented IT infrastructures: enabling secure distributed service compositions
Web services represent the emerging technology for many enterprise application architectures. Due to widely accepted standards for the specification of service interfaces and communication protocols, they constitute the preferred approach for integrating resources and legacy systems, easing the reusability of modules and the reconfiguration of higher-order business processes. Furthermore, inter...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006