학술논문

Five examples of web-services for illustrating requirements for security architecture
Document Type
Conference
Source
2011 International Conference on Data and Knowledge Engineering (ICDKE) Data and Knowledge Engineering (ICDKE), 2011 International Conference on. :47-54 Sep, 2011
Subject
Computing and Processing
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Access control
Containers
Computer architecture
Service oriented architecture
Complexity theory
Language
Abstract
The tension caused by the need for expressive power when formulating security rules and the need to keep computational complexity low when undertaking the necessary access rule evaluations is a major challenge in the formulation of good security architecture. This paper provides five examples of security in web services. which illustrate this tension. These examples highlight the need for more expressiveness in the rules used to express policies in three cases, and in the other the fact that XACML appears to have nearly adequate expressiveness without undue complexity. Each example is expressed first informally, by describing a service which could concievably be provided in a web services architecture, then the example is also outlined using either XACML, first order logic or both.