Abstract
In the recent years, modern complex infrastructures are built on integration and cooperation of legacy and/or new systems; the emerging technology, to primary face the involved interoperability problems, is based on web service solutions. It is based on open standards and common data formats which allow a deep cooperation among Entities and applications and guarantee strong resource sharing. In such context security plays a primary role to control access to data and functionalities offered by distributed services. In this paper we illustrate a policy-based approach to manage security and personalization, in particular we have designed a hybrid infrastructure based on web services in which policy enforcer mechanisms are managed both in a centralized way by the registry server and in a distributed way, i.e. each service implements security mechanisms to authenticate and authorize users. A case study is illustrated showing a distributed architecture for health-care applications.
This work was partially supported by “Centro Regionale di Competenze” and “Progetto Telemedicina” Regione Campania.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Barone, G.B., Margarita, N., Mazzocca, N., Mazzeo, A., Romano, L.: Secure Access to Personalized Web Services. In: Proceedings of Pacific Rim International Symposium on Dependable Computing, Seoul, Korea, pp. 266–269. IEEE Comput. Soc, Los Alamitos (2001)
Baum, M.S., Ford, W.: Secure Electronic Commerce. Prentice-Hall, Englewood Cliffs (1997)
Beznosov, K., Hartman, B., Flinn, D.J., Kawamoto, S.: Mastering Web Services Security. Wiley, Chichester
Boll, S.: Modular Content Personalization Service Architecture for E-Commerce Applications. In: Proceedings of the 4th IEEE Int’l Workshop on Advanced Issues of E-Commerce and Web- Based Information Systems (WECWIS 2002), pp. 213–220. IEEE Comput. Soc., Los Alamitos (2002)
Bosworth, A.: Developing Web Services. In: Proceedings 17th International Conference on Data Engineering, pp. 477–481. IEEE Comput. Soc., Los Alamitos (2001)
David, A.: Chappell and Tyler Jewell. In: Java Web Services, O’Reilly, Sebastopol
Ferraiolo, D., Cugini, J., Kuhn, D.: Role-Based Access Control (RBAC): Features and Motivations. In: Computer Security Applications, pp. 241–248 (1995)
Hada, S., Kudo, M.: XML Access Control Language: Provisional Authorization for XML Documents. Tokyo Research Laboratory, IBM Research (2003), http://www.alphaworks.ibm.com/aw.nsf/download/xmlsecuritysuite
Kreger, H.: Web Services Conceptual Architecture. IBM Software Group (May 2001)
RFC 2459. Internet X.509 Public Key Infrastructure Certificate and CRL Profile
XACML: eXtensible Access Control Markup Language, http://www.oasis-open.org/committees/xacml/repository/
AA.VV. UDDI technical white paper Role Uddi.Org (September 2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Casola, V., Mazzeo, A., Mazzocca, N., Venticinque, S. (2006). Design of Policy-Based Security Mechanisms in a Distributed Web Services Architecture. In: Dongarra, J., Madsen, K., Waśniewski, J. (eds) Applied Parallel Computing. State of the Art in Scientific Computing. PARA 2004. Lecture Notes in Computer Science, vol 3732. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11558958_54
Download citation
DOI: https://doi.org/10.1007/11558958_54
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29067-4
Online ISBN: 978-3-540-33498-9
eBook Packages: Computer ScienceComputer Science (R0)