Web Services Security Architectures Composition and Contract Design using RBAC

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 8

Abstract

Service Oriented Architecture’s Web Services authorization traditionally is done using common access control models like Role-Based Access Control. In thinking of a composite application that stitches together the capabilities of multiple services, any action in the composite app should ideally check the access control rules of all constituent services before initiating an action. The Web Services Access controls are categorized according to access control granularity and have two approaches: The first approach supports a egotiation-based attribute-based access control to Web Services with fine access granularity. The second approach is tailored to access control for conversation-based Web services and composite services; where in a Web Service is not considered as a set of independent operations and therefore access control must take such dependencies into account. During a Web Services invocation, a client interacts with the service, performing a sequence of operations in a particular order called conversation. In this paper, we want to propose strategies for analyzing and managing Role Based Access Control policies for designing Security Architectures for web services. We validate role-based access control with a case study, where in access decisions are based on the roles that individual users have as part of an organization. Users take on assigned roles. The process of defining roles should be based on a thorough analysis of how an organization operates and should include input from a wide spectrum of users in an organization. Access rights are grouped by role name, and the use of resources is restricted to individuals authorized to assume the associated role. For example, within a hospital system the role of doctor can include operations to perform diagnosis, prescribe medication, and order laboratory tests; and the role of researcher can be limited to gathering anonymous clinical information for studies. The use of roles to control access can be an effective means for developing and enforcing enterprise-specific security policies, and for streamlining the security management process. Under the RBAC framework, users are granted membership into roles based on their competencies and responsibilities in the organization. The operations that a user is permitted to perform are based on the user's role.

Authors and Affiliations

D. Shravani , Dr. P. Suresh Varma , Dr. B. Padmaja Rani , Dr. D. Sravan Kumar , M. Upendra Kumar

Keywords

Related Articles

“Spotting the techniques on OPENMP Compilers and its Optimization”

OPENMP is a parallel programming technique which is employed in order to improve the optimization. The research paper proposes a number of techniques which can be used to enhance the performance and execution of parallel...

Migrations amid Generations of Wireless networks

This article presents an overview of migrations among various generations with emphasis on trends in the areas of wireless networking. Migrations from one type of network to another are being experienced due to advances...

Index Structure for the Multi-scale Representation of Multi-dimensional Spatial Data in WebGIS

To solve the problem that existing data structure cannot support the multi-scale representation of multi-dimensional spatial data in Web eographic Information System (WebGIS), a modified data structure has been put forw...

Efficient use of available network in mobile for executing mobile application with real time constraints.

In today’s world mobile fulfill most of computational needs of average persons in form of different applications. As smart phones works in multiprocessing mode, no of applications gets executed simultaneously executed in...

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

Multimedia and Internet have become our daily needs. It has become a common practice to create copy, transmit and spread digital data .It leads to unauthorized duplication problem. Digital image watermarking provides a p...

Download PDF file
  • EP ID EP160497
  • DOI -
  • Views 127
  • Downloads 0

How To Cite

D. Shravani, Dr. P. Suresh Varma, Dr. B. Padmaja Rani, Dr. D. Sravan Kumar, M. Upendra Kumar (2010). Web Services Security Architectures Composition and Contract Design using RBAC. International Journal on Computer Science and Engineering, 2(8), 2609-2615. https://europub.co.uk/articles/-A-160497