lows to exploit the history of service invocations to
make access control decisions. Unfortunately in prac-
tice the specification of policies in PPLTL is not very
friendly for security designers. (She et al., 2013)
and (Mecella et al., 2006) also discuss access control
in web service composition. Nevertheless, their ap-
proach is different from ours. They consider the issue
of service unavailability along a pathway to a target
service, and they solve it by invoking dynamically al-
ternative services belonging to different domains.
Several extensions of the OrBAC model have been
proposed recently in order to specify security rules
for intra- as well as inter-organizations. For instance
(Y. Deswarte, 2009) have proposed a new access con-
trol framework for inter-Organizational Web services
(PolyOrBAC). The authors model permissions, pro-
hibitions and obligations in timed automata to verify
properties such as reachability and correctness. They
consider the case of a service requested remotely from
a different organization. In this case, in order to au-
thorize a user from a different domain to access a ser-
vice, a particular role is associated to a virtual user,
then a specific rule defined as a circumstance (context
relation in OrBAC) is applied. However, they do not
address the transitive access problem for dependent
services, nor use requesters’ credentials for comput-
ing the rights of access.
7 CONCLUSION
We have proposed a solution to the challenging prob-
lem of transitive dependencies in web service invoca-
tions by extending the OrBAC model with a cross-
domain delegation graph (relation). Our model is
flexible and dynamic since permissions are computed
according to the value of users’ credentials at the mo-
ment of the request, while in standard OrBAC, per-
missions are pre-assigned to users when the security
policy is defined. By using Datalog as the specifica-
tion language, the extended OrBAC model supports
an automated analysis technique for executing scenar-
ios before applications are deployed. We have also
shown how access control policies can be enforced
by extending the standard XACML architecture with
a module handling the delegation graph.
REFERENCES
Abiteboul, S., Hull, R., and Vianu, V. (1995). Foundations
of Databases. Addison-Wesley.
Armando, A., Carbone, R., Compagna, L., and Pellegrino,
G. (2012). Automatic Security Analysis of SAML-
Based Single Sign-On Protocols.
Bertolissi, C. and Fern
´
andez, M. (2014). A metamodel of
access control for distributed environments: Applica-
tions and properties. Inf. Comput., 238:187–207.
Brown, P. (2008). Implementing SOA: Total Architecture in
Practice. TIBCO Press Series. Addison-Wesley.
Carbonnelle, P. (2014). pyDatalog. https://sites.
google.com/site/pydatalog/.
Ceri, S., Gottlob, G., and Tanca, L. (1989). What you al-
ways wanted to know about datalog (and never dared
to ask). Knowledge and Data Engineering, IEEE
Transactions on, 1(1):146–166.
Chadwick, D., Otenko, S., and Nguyen, T. A. (2006).
Adding support to xacml for dynamic delegation of
authority in multiple domains. In Communications
and Multimedia Security.
Chen, W. and Warren, D. S. (1996). Tabled evaluation with
delaying for general logic programs. Journal of the
ACM, 43:43–1.
Dantsin, E., Eiter, T., Gottlob, G., and Voronkov, A. (2001).
Complexity and expressive power of logic program-
ming. ACM Comput. Surv., 33(3):374–425.
Fischer, J. and Majumdar, R. (2008). A theory of role com-
position. In IEEE Int. Conf. on Web Services, pages
320–328.
Kalam, A., Baida, R., Balbiani, P., Benferhat, S., Cuppens,
F., Deswarte, Y., Miege, A., Saurel, C., and Trouessin,
G. (2003). Organization based access control. In 4th
Int. Ws. POLICY, pages 120–131.
Karp, A. and Li, J. (2010). Solving the transitive access
problem for the services oriented architecture. In In-
ternational Conference ARES, pages 46–53.
Li, J. and Karp, A. H. (2007). Access control for the ser-
vices oriented architecture. In Proceedings of the 2007
ACM Workshop on Secure Web Services, SWS ’07,
pages 9–17. ACM.
Li, N. and Mitchell, J. C. (2003). Datalog with constraints:
a foundation for trust management languages. In
PADL’03, pages 58–73.
Mecella, M., Ouzzani, M., Paci, F., and Bertino, E. (2006).
Access control enforcement for conversation-based
web services. In 15th Int. Conf. on WWW, pages 257–
266, USA. ACM.
She, W., Yen, I.-L., Thuraisingham, B., and Bertino, E.
(2013). Security-aware service composition with fine-
grained information flow control. Services Comput-
ing, IEEE Transactions on, 6(3):330–343.
Srivatsa, M., Iyengar, A., Mikalsen, T., Rouvellou, I., and
Yin, J. (2007). An access control system for web ser-
vice compositions. In IEEE Int. Conf. on Web Ser-
vices, pages 1–8.
Y. Deswarte, A. A. E. K. (2009). Poly-OrBAC: An access
control model fior inter-organizational web services.
IGI-Global.
SECRYPT2015-InternationalConferenceonSecurityandCryptography
300