Web Services Security Architectures using RoleBased Access Control 

Abstract

The Web Services Access controls are categorized according to access control granularity and have two approaches: The first approach supports a negotiation-based attribute-based access control to Web Services with fine access granularity. The second approach is tailored to access control for conversation-based Web services and composite services; where in a Web Service is not considered as a set of independent operations and therefore access control must take such dependencies into account. During a Web Services invocation, a client interacts with the service, performing a sequence of operations in a particular order called conversation. In this  paper, we want to propose strategies for analyzing and managing Role Based Access Control policies for designing Security Architectures for web services. We validate role-based access control with a case study, where in access decisions are based on the roles that individual users have as part of an organization. Users take on assigned roles. The process of defining roles should be based on a thorough analysis of how an organization operates  and should include input from a wide spectrum of users in an organization. Access rights are grouped by role name, and the use of resources is restricted to individuals authorized to assume the associated role. For example, within a hospital system the role of doctor can include operations to perform diagnosis, prescribe medication, and order laboratory tests; and the role of researcher can be limited to gathering anonymous clinical information for studies. The use of roles to control access can be an effective means for developing and enforcing enterprisespecific security policies, and for streamlining the security management process. Under the RBAC framework, users are granted membership into roles based on their competencies and  responsibilities in the organization. The operations that a user is permitted to perform are based on the user's role.

Authors and Affiliations

K. Venkateswar Rao , Dr. M. Srinivasa Rao , K. Mrunalini Devi , Dr. D. Sravan Kumar , M. Upendra Kumar

Keywords

Related Articles

Outlier Detection for Multidimensional Medical Data

The knowledge-rich nature of the Medical Information domain has made it an ideal environment where knowledge on data mining should have to be unearthed from large data collection for dialysis’ of growing unknown diseases...

A New Hashing and Caching Approach for Minimizing Overall Location Management Cost in Next-Generation Wireless Networks

This paper proposes a new hashing and caching strategy (NHC) in order to reduce the overall location management cost in wireless mobile networks. It uses caches whose up-to-date information is responsible for dropping th...

Anti-Phishing Design Using Mutual Authentication Approach

The act of sending an e-mail to a client fallaciously declares to be a recognized genuine organization in an endeavour to deceive the client into compromise confidential information that will be used for identity theft....

AN INSTINCTIVE APPROACH FOR SECURE COMMUNICATION - ENHANCED DATA ENCRYPTION STANDARD (EHDES)

In this article, we establish a new architecture of information security for secure or more secure communication in network. Data encryption process is the main precious and important for secure transaction of informatio...

Download PDF file
  • EP ID EP144907
  • DOI -
  • Views 89
  • Downloads 0

How To Cite

K. Venkateswar Rao, Dr. M. Srinivasa Rao, K. Mrunalini Devi, Dr. D. Sravan Kumar, M. Upendra Kumar (2010).  Web Services Security Architectures using RoleBased Access Control . International Journal of Computer Science and Information Technologies, 1(5), 402-407. https://europub.co.uk/articles/-A-144907