Addie, Ronald G. and Moffatt, Sam and Dekeyser, Stijn and Colman, Alan (2011) Five examples of web-services for illustrating requirements for security architecture. In: 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011), 6-8 Sep 2011, Milan, Italy.
PDF (Accepted Version)
The tension caused by the need for expressive power when formulating security rules and the need to keep computational complexity low when undertaking the necessary access rule evaluations is a major challenge in the formulation of good security architecture. This paper provides five examples of security in web services. which illustrate this tension. These examples highlight the need for more expressiveness in the rules used to express policies in three cases, and in the other the fact that XACML appears to have nearly adequate expressiveness without undue complexity. Each example is expressed first informally, by describing a service which could concievably be provided in a web services architecture, then the example is also outlined using either XACML, first order logic or both.
|Item Type:||Conference or Workshop Item (Commonwealth Reporting Category E) (Paper)|
|Additional Information:||Accepted version deposited in accordance with the copyright policy of the publisher.|
|Uncontrolled Keywords:||web-services; web-security; XACML; computational complexity; security architecture|
|Depositing User:||Dr Ron Addie|
|Date Deposited:||03 Feb 2012 05:21|
|Last Modified:||03 Jul 2013 00:55|
Actions (login required)
|Archive Repository Staff Only|