Abstract
GOLD (Grid-based Information Models to Support the Rapid Innovation of New High Value-Added Chemicals) is concerned with the dynamic formation and management of virtual organisations in order to exploit market opportunities. The project aims to deliver the enabling technology to support the creation, operation and successful dissolution of such virtual organisations. A set of middleware technologies are designed and being implemented to address issues such as trust, security, contract management and monitoring, information management, etc. for virtual collaboration between companies. In this paper we discuss the set of requirements for access control in dynamic virtual organisations that have been defined as part of the trust-related work. We propose a solution, which extends the ideas of role based access control (RBAC), and we examine the use of existing and emerging Web Services technologies as an implementation platform.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anderson, T., Avizienis, A., Carter, W.: Dependability: Basic Concepts and Terminology. In: Laprie, J.-C. (ed.) Series: Dependable Computing and Fault-Tolerant Systems, vol. 5. Springer, New York (1992)
Coulouris, G., Dollimore, J.: Security Requirements for Cooperative Work: A Model and its System Implications. Presented at 6th Workshop on ACM SIGOPS European Workshop: Matching Operating Systems to Application Needs, Wadern, Germany (1994)
Roshan, K.T., Sandhu, R.S.: Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Authorization Management. Presented at IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects (1997)
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer 29, 38–47 (1996)
Thomas, R.K.: Team-based Access Control (TMAC): A Primitive for Applying Rolebased Access Controls in Collaborative Environments. Presented at Second ACM Workshop on Role-based Access Control, Fairfax, Virginia, United States (1997)
Periorellis, P., Dobson, J.E.: Case Study Problem Analysis. The Travel Agency Problem, University of Newcastle upon Tyne, Newcastle upon Tyne, UK (2001)
Davies, C.T.: Spheres of Control. IBM Systems Journal 17, 179–198 (1978)
Romanovsky, A.: Coordinated Atomic Actions: How to Remain ACID in the Modern World. ACM SIGSOFT Software Engineering Notes 26, 66–68 (2001)
Zorzo, A.F., Periorellis, P., Romanovsky, A.: Using Coordinated Atomic Actions for Building Complex Web Applications: a Learning Experience. In: Presented at 8th IEEE International Workshop on Object-oriented Real-time Dependable Systems (WORDS 2003), Guadalajara, Mexico (2003)
Service-Oriented Architecture (SOA) Definition, http://www.service-architecture.com/web-services/articles/service-oriented_architecture_soa_definition.html
Ferguson, D.F., Storey, T., Lovering, B., Shewchuk, J.: Secure, Reliable, Transacted Web Services: Architecture and Composition (2003), http://msdn.microsoft.com/webservices/default.aspx?pull=/library/en-us/dnwebsrv/html/wsoverview.asp
He, H.: What is Service-Oriented Architecture (2003), http://webservices.xml.com/pub/a/ws/2003/09/30/soa.html
Parastatidis, S., Webber, J., Watson, P., Rischbeck, T.: WS-GAF: A Grid Application Framework based on Web Services Specifications and Practices. Submitted for publication (2004)
Sprott, D., Wilkes, L.: Understanding Service-Oriented Architecture (2004), http://msdn.microsoft.com/library/en-us/dnmaj/html/aj1soa.asp
Web Services Secure Conversation Language (WS-SecureConversation) (2004), http://msdn.microsoft.com/ws/2004/04/ws-secure-conversation/
Web Services Coordination (WS-Coordination) (2003), http://msdn.microsoft.com/ws/2003/09/wscoor
Web Services Atomic Transaction (WS-AtomicTransaction) (2003), http://msdn.microsoft.com/ws/2003/09/wsat
OASIS(WS-CAF), Web Services Context (WS-CTX), http://www.iona.com/devcenter/standards/WS-CAF/WSCTX.pdf
Rosenberg, J., Remy, D.: Securing Web Services with WS-Security. Sams Publishing, Indianapolis (2004)
OASIS, Web Services Security (WS-Security), http://www.oasis-open.org/committees/wss
Web Services Trust Language (WS-Trust) (2004), http://msdn.microsoft.com/ws/2004/04/wstrust/
Web Services Federation Language (WS-Federation) (2003), http://msdn.microsoft.com/ws/2003/07/ws-federation/
OASIS, Security Assertion Markup Language (SAML) v2.0. (2004), http://www.oasis-open.org/committees/security
OASIS, Extensible Access Control Markup Language (XACML), http://www.oasis-open.org/committees/xacml
Gudgin, M., Hadley, M., Moreau, J.-J., Nielsen, H.F. (eds.): W3C, SOAP Version 1.2 Part 1: Messaging Framework. W3C Recommendations (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Periorellis, P., Parastatidis, S. (2005). Task-Based Access Control for Virtual Organizations. In: Guelfi, N., Reggio, G., Romanovsky, A. (eds) Scientific Engineering of Distributed Java Applications. FIDJI 2004. Lecture Notes in Computer Science, vol 3409. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31869-9_4
Download citation
DOI: https://doi.org/10.1007/978-3-540-31869-9_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25053-1
Online ISBN: 978-3-540-31869-9
eBook Packages: Computer ScienceComputer Science (R0)