Security Policies in Dynamic Service Compositions

Julian Schütte, Hervais Simo Fhom, Mark Gall

2012

Abstract

The paradigm of service composition emerged in the context of service oriented architectures, where it mainly referred to creating value-added services by combinitions of individual services. Nowadays, service composition is getting more and more dynamic and becomes part of pervasive systems. One of the major challenges in this context is to fulfill the security requirements of all involved parties without requiring human interaction to negotiate protection level agreements. In this paper, we propose an approach for composing access control decisions and obligations required by equitable policy domains on the fly. We show that our approach allows a policy-compliant collaboration without requiring the peers to reveal their individual rules and confirm its practicability by a prototype.

References

  1. Baader, F., Horrocks, I., and Sattle, U. (2007). Handbook of Knowledge Representation, chapter 3 Description Logics, pages 135-180. Elsevier. ISBN 0444522115.
  2. Bonatti, P., De Capitani di Vimercati, S., and Samarati, P. (2002). An algebra for composing access control policies. ACM Transaction on Information System Security, 5:1-35.
  3. Cuppens, F., Cholvy, L., Saurel, C., and Carrère, J. (1998). Merging security policies: Analysis of a practical example. In Proc. of the 11th IEEE Computer Security Foundations Workshop (CSFW), pages 123-137. IEEE Computer Society Press.
  4. Governatori, G. (2004). Defeasible description logics. In Antoniou, G. and Boley, H., editors, Rules and Rule Markup Languages for the Semantic Web, volume 3323 of Lecture Notes in Computer Science, pages 98-112. Springer Berlin / Heidelberg.
  5. Kagal, L., Berners-Lee, T., Connolly, D., and Weitzner, D. (2006). Using semantic web technologies for policy management on the web. In Proc. 21st National Conf. on Artificial Intelligence (AAAI).
  6. Lee, A., Boyer, J. P., Olson, L. E., and Gunter, C. A. (2006). Defeasible security policy composition for web services. In Proc. of the fourth ACM workshop on Formal methods in security, FMSE 7806, pages 45-54, New York, NY, USA. ACM.
  7. Nejdl, W., Olmedilla, D., Winslett, M., and Zhang, C. C. (2005). Ontology-based policy specification and management. In In 2nd European Semantic Web Conference (ESWC), pages 290-302. Springer.
  8. Nute, D. (2003). Defeasible logic. In Bartenstein, O., Geske, U., Hannebauer, M., and Yoshie, O., editors, Web Knowledge Management and Decision Support, volume 2543 of LNCS, pages 151-169. Springer Berlin / Heidelberg.
  9. Schütte, J. (2011). Apollon: Towards a modular semantic policy framework for pervasive systems. In Int'l Conf. Security and Cryptography (SECRYPT).
  10. Toninelli, A., Montanari, R., Kagal, L., and Lassila, O. (2007). Proteus: A semantic context-aware adaptive policy model. In Proc. Int'l Workshop on Policies for Distributed Systems and Networks (POLICY).
  11. Wei, W. and Yu, T. (2010). The design and enforcement of a rule-based constraint policy language for service composition. In Social Computing (SocialCom), 2010 IEEE Second International Conference on, pages 873-880.
Download


Paper Citation


in Harvard Style

Schütte J., Simo Fhom H. and Gall M. (2012). Security Policies in Dynamic Service Compositions . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012) ISBN 978-989-8565-24-2, pages 233-238. DOI: 10.5220/0004025302330238


in Bibtex Style

@conference{secrypt12,
author={Julian Schütte and Hervais Simo Fhom and Mark Gall},
title={Security Policies in Dynamic Service Compositions},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)},
year={2012},
pages={233-238},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004025302330238},
isbn={978-989-8565-24-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)
TI - Security Policies in Dynamic Service Compositions
SN - 978-989-8565-24-2
AU - Schütte J.
AU - Simo Fhom H.
AU - Gall M.
PY - 2012
SP - 233
EP - 238
DO - 10.5220/0004025302330238