Previous [ 1] [ 2] [ 3] [ 4] [ 5] [ 6] [ 7] [ 8] [ 9] [ 10] [ 11] [ 12] [ 13] [ 14] [ 15]

@

Journal of Information Science and Engineering, Vol. 27 No. 6, pp. 1839-1853 (November 2011)

Embedding Access Control Policy in Web Service Path Composition Algorithm

SHIH-CHIEN CHOU AND JIN-YUAN JHU
Department of Computer Science and Information Engineering
National Dong Hwa University
Hualien, 974 Taiwan
E-mail: scchou@mail.ndhu.edu.tw

Web services accomplish requirements, which are complicated functions. To apply web services for a requirement, it should be decomposed into sub-functions for web services. After the decomposition, web services are selected to compose paths. During composition, secure access of web services should be considered. This paper proposes a twoleveled web service access control policy and a web service composition algorithm. We embed the policy in the algorithm. The upper level access control policy uses attributes and credentials to filter out the web services that cannot be invoked by a requester. The lower level policy compares the credit level numbers of web services with the security level numbers of arguments to evaluate the possibility of leaking the arguments. The possibility facilitates evaluating the successfulness of executing a path. After access control, the composition algorithm composes multiple paths.

Keywords: web service, access control, access control policy, web service composition, information flow control

Full Text () Retrieve PDF document (201111_03.pdf)

Received August 19, 2010; revised December 6, 2010 & March 7, 2011; accepted April 4, 2011.
Communicated by Chih-Ping Chu.
* Part of the paper had been appeared in the 6th International Conference on Advanced Information Management and Service (IMS 2010), Korea, 2010.