modification of the service response and request in
order to modify it according the authorization policy.
The service itself can be designed and implemented
in a very generic way.
The use of resource hierarchies is quite common.
Normally similar single resources are grouped, like
printers (Ilechko and Kagan, 2006). The hierarchies
are used to assign identical authorization policies, of-
ten ACLs, to all members. Our approach is the first
using the resource hierarchy in the opposite way and
putting single resources in a hierarchy that can be ad-
dressed explicitly in the authorization policy.
6 CONCLUSION
We present a dynamic context-aware access control
that can be used in a SOA based architecture. We
propose a separation of business and security logic on
the service level that allows the definition of adapt-
able and easily extensible authorization policies out-
side the service. The complexity when mixing access
control into the business logic can be avoided. The
externalized authorization policies are more explicit.
The authorization policies are dynamically en-
forced using runtime context information. Resource
hierarchies make it possible to define the authoriza-
tion policy granularity outside the service. The defi-
nition of the resource hierarchy itself is based on ser-
vice, on the needs of the client application and, if
needed, on additional context information. The hi-
erarchy helps to keep the relationships between the
sub resources, which would not be the case when the
service itself would split its functionality to a similar
level.
The use of context information questions the way
in which the information is acquired. Context-aware
services and applications have to deal with issues of
trust and dependability. In this paper, we did not ad-
dress the related problems but we will focus them in
the future.
Performance in SOA based application is an issue
investigated by industry and the research community.
The proposed architecture consisting of messages fil-
ters and the Contextual Authorization Services adds
an additional bottleneck. Retrieving and processing
of context information is also time consuming. Due
to the application of the resource filters after the busi-
ness logic it is also possible that the SOA service pro-
cesses and retrieves more data than later passed to the
client applications. There is a need for adaptation of
our architecture in the area of high performance ap-
plication.
REFERENCES
Beznosov, K. (2002). Object security attributes: Enabling
application-specific access control in middleware. In
4th International Symposium on Distributed Objects
and Applications (DOA), pages 693–710.
Chen, G. and Kotz, D. (2000). A Survey of Context-
Aware Mobile Computing Research. Technical Report
TR2000-381, Dartmouth College, Computer Science,
Hanover, NH.
den Bergh, J. V. and Coninx, K. (2005). Towards inte-
grated design of context-sensitive interactive systems.
In PERCOMW ’05: Proceedings of the Third IEEE In-
ternational Conference on Pervasive Computing and
Communications Workshops.
Galiasso, P., Bremer, O., Hale, J., Shenoi, S., and al. (2000).
Policy mediation for multi-enterprise environments.
In ACSAC ’00: Proceedings of the 16th Annual Com-
puter Security Applications Conference.
Ilechko, P. and Kagan, M. (2006). Authorization concepts
and solutions for j2ee applications.
Kalam, A. A. E., Benferhat, S., Mi
`
ege, A., Baida, R. E.,
Cuppens, F., Saurel, C., Balbiani, P., Deswarte, Y., and
Trouessin, G. (2003). Organization based access con-
trol. In POLICY ’03: Proceedings of the 4th IEEE In-
ternational Workshop on Policies for Distributed Sys-
tems and Networks, page 120, Washington, DC, USA.
Lachmund, S., Walter, T., Bussard, L., Gomez, L., and
Olk, E. (2006). Context-aware access control. In
IWUAC’06: Proceedings of the third Annual Interna-
tional Conference on Mobile and Ubiquitous Systems.
Mikalsen, M. and Kofod-Petersen, A. (2004). Represent-
ing and Reasoning about Context in a Mobile Envi-
ronment. In Schulz, S. and Roth-Berghofer, T., edi-
tors, Modeling and Retrieval of Context 2004 (MRC),
volume 114, pages 25–35.
MOSQUITO (2006). IST 004636 MOSQUITO Project.
Moyer, M., Covington, M., and Ahamad, M. (2000). Gen-
eralized role-based access control for securing future
applications. In 23rd National Infromation Systems
Security Conference (NISSC 2000).
OASIS (2003). eXtensible Access Control Markup Lan-
guage (XACML) 1.1.
OASIS (2005). Web Service Trust Language (WS-Trust)
1.3.
OASIS (2006). Web Service Security: SOAP Message Se-
curity 1.1 (WS-Security 2004).
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman,
C. E. (1996). Role-based access control models. IEEE
Computer, 29(2):38–47.
W3C (1999). W3C XSL transformations (XSLT) 1.0.
Zhang, G. and Parashar, M. (2004). Context-aware dynamic
access control for pervasive computing.
DYNAMIC CONTEXT-AWARE ACCESS CONTROL - Use of Resource Hierarchies to Define Fine-grained, Adaptable
Authorization Policies
393