The Second International Conference on Availability, Reliability and Security (ARES'07) 2007
DOI: 10.1109/ares.2007.138
|View full text |Cite
|
Sign up to set email alerts
|

Security Requirements for a Semantic Service-oriented Architecture

Abstract: Service-oriented architectures (SOAs) are a commonly used paradigm for IT infrastructures in various fields. Due to their flexibility and the easy accessibility of their underlying web services, SOAs are the architecture of choice for more and more service providers. Semantic SOAs (SSOAs) are going one step further and are enhancing the common SOA with semantic components.However, a major success criterion of any SOA is the existence of a reliant security infrastructure. Therefore, this paper identifies securi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0
2

Year Published

2008
2008
2013
2013

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 5 publications
(3 reference statements)
0
6
0
2
Order By: Relevance
“…After Rampart has been loaded into the Axis2 engine, as a module to implement the WS-Security, it can do security handling to all the effective services. Rampart can also just execute security handling to one or more services or a specific method in a service [9] [10].…”
Section: Rampart Security Policymentioning
confidence: 99%
“…After Rampart has been loaded into the Axis2 engine, as a module to implement the WS-Security, it can do security handling to all the effective services. Rampart can also just execute security handling to one or more services or a specific method in a service [9] [10].…”
Section: Rampart Security Policymentioning
confidence: 99%
“…Therefore, this section focuses on the differences and adoptions we performed for real-world deployment. The presented architecture and data flow implement all requirements gathered in [25], [26], [2].…”
Section: A Semantic Security Architecture For Web Servicesmentioning
confidence: 99%
“…Restricting access to valuable service resources only after trustful authorization was seen as a crucial part to heighten the overall security of the semantic service-oriented system and the reliability in general [2]. Our semantic security architecture for service-oriented systems based on the attribute-based access control paradigm [3] has already been described in [4], [5], [6] and has now successfully been implemented.…”
Section: Introductionmentioning
confidence: 99%
“…Die sich wandelnde IT-Landschaft im behördlichen Umfeld einerseits und einschlägige politisch-rechtliche Vorgaben (wie die EU-Richtlinien zum Datenschutz und zur Dienstleistungserbringung [11,12]) andererseits schaffen ein Umfeld, in dem neue Antworten auf die widerstrebenden Interessen von Datenschutz und datenintensiven Geschäftsprozessen gefunden werden müssen. Das europäische Forschungsprojekt Access-eGov (http://www.accessegov.org) hat es sich zum Ziel gesetzt, in diesem Umfeld eine verteilte serviceorientierte AAI zu entwickeln, in der den Anforderungen dynamischer Autorisierung und datenschutzgerechter Zugriffskontrolle eine besondere Bedeutung beigemessen wird [9]. …”
Section: Introductionunclassified
“…Dieser verwendet das Token dazu, um auf die geschützte Ressource zuzugreifen (8). Das Token wird vom PEP geprüft, und nachdem es anerkannt wird, kann der Ressourcenzugriff gewährt werden (9). Abbildung 3 zeigt ein Sequenzdiagramm des eben beschriebenen Zugriffskontrollvorganges, das die Rolle der jeweiligen Systemakteure innerhalb der Zugriffskontrollarchitektur verdeutlicht.…”
Section: Introductionunclassified