Вы находитесь на странице: 1из 9

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/220985468

Quality of Security Service for Web Services within SOA

Conference Paper · July 2009


DOI: 10.1109/SERVICES-I.2009.95 · Source: DBLP

CITATIONS READS
12 84

3 authors:

Hany F. El Yamany Miriam A. M. Capretz


Suez Canal University The University of Western Ontario
36 PUBLICATIONS   281 CITATIONS    143 PUBLICATIONS   1,208 CITATIONS   

SEE PROFILE SEE PROFILE

David S. Allison
The University of Western Ontario
20 PUBLICATIONS   184 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

A Web Service-Based Framework for an Online 3D Model Viewer View project

Developing an Adaptive Replica-based Framework for Web Services View project

All content following this page was uploaded by Hany F. El Yamany on 05 August 2014.

The user has requested enhancement of the downloaded file.


2009 Congress on Services - I

Quality of Security Service for Web Services within SOA

Hany F. EL Yamany, Miriam A. M. Capretz and David S. Allison


Department of Electrical and Computer Engineering
Faculty of Engineering
University of Western Ontario
London, Ontario, N6A 5B9, Canada
{helyaman, mcapretz, dallison }@uwo.ca

Abstract consumer and provider exchange request/response


messages through the use of protocols such as Simple
Service-Oriented Architecture (SOA) is a paradigm for Object Access Protocol (SOAP). Figure 1 depicts the
creating and encapsulating business processes in the basic structure of SOA [2].
form of loose-coupling, autonomous and abstracted
services. Managing the non-functional requirements of
SOA such as security, is an overarching problem due to
the wide variety of ways the service consumer can access
the services offered by the service provider and the
equally varied restrictions the service provider can set for
gaining access by the service consumer. In this work, we
propose a metadata for quality of security service for
SOA. The proposed metadata provides different levels to
describe the available variations of the Authentication,
Authorization and Privacy features that are related to Figure 1. The main structure of SOA
SOA security. A Web Service for Quality of Security
Service (QoSS) is then constructed to encapsulate the One of the greatest challenges in designing SOA is
suggested metadata in order to assist the service organizing and managing its security requirements. This
consumer and provider to achieve a QoSS agreement challenge stems from the large number of available
meeting both of their requirements. The QoSS agreement security policies that Web services, and typically SOA,
will perform as an enforced policy for managing the can use for protection. The variety of security policies
interactions between the service provider and consumer. available may confuse the service provider and consumer
The service of QoSS is located inside a complete as to which security policy they should adopt in order to
framework for securing SOA. achieve both a straightforward and secure
intercommunication. There is also always a conflict
between the loose services access that the service
1. Introduction consumer may ask for and the security policies that the
service provider insists upon. The service provider needs
Service-Oriented Architecture (SOA) is a paradigm for these security policies in order to prevent any breaches or
creating and using business processes. The business vulnerabilities that may result from the unconditional and
processes are encapsulated inside loose-coupling, unsafe access requested by the service consumer. This
autonomous and abstracted components, called services conflict requires a highly managed technique to be
[1]. These services are offered and published by a service deployed as an intermediary between the service provider
provider who acquires the business processes. The and consumer to organize policy concerns. Consequently
services are designed to be easily published and the Quality of Security Service (QoSS) becomes an
discovered through a service registry such as the important requirement for SOA security.
Universal Description, Discovery and Integration (UDDI) Some of the known works has addressed the QoSS as
platform by registering its abstracted Web Service just an authentication lemma such as the presented works
Description Language (WSDL) file within that platform. by Irvine and Levin[3], and Papazoglou et al. [4],
The service consumer can search the UDDI for the classifying it in several categories based on some defined
services he/she needs. Once the service consumer finds metrics such as the strength of the authentication tokens
the required services, he/she sends a request to the service and the encryption methods. This is a poor definition of
provider asking for access to those services. The service QoSS for SOA security as it does not properly reflect all

978-0-7695-3708-5/09 $25.00 © 2009 IEEE 653


DOI 10.1109/SERVICES-I.2009.95
the main elements that constitute the SOA security The remainder of this paper provides specific details
structure, including authorization and privacy [7]. In fact, about our proposed QoSS Service and its encapsulated
Ran [5] has suggested expanding the definition of QoSS QoSS model. Section 2 demonstrates a brief summary of
to include the other terms of SOA security such as the SOA security framework that embeds the service of
authorization and non-repudiation, but no specific details QoSS. Section 3 provides a full description of the
have been mentioned. However, one recent work proposed QoSS metadata, and Section 4 depicts the
presented by Mohamed et al. [6] has already added some suggested Services of QoSS (SQoSS). Section 5
authorization terms within the QoSS definition, illustrates the implementation of SQoSS and Section 6
demonstrating the variations of the access control describes the current research on SOA QoS and QoSS
techniques that might be applied inside an SOA specifically. Finally, Section 7 contains a summary and
environment. This proves the importance of expanding presents future work.
the QoSS to include the other SOA security aspects, such
as privacy [7], in order to achieve a fine-grained 2. SOA Security Framework
definition of QoSS.
Encapsulating the QoSS definition inside a Web Designing a security framework that supports and
Service running for SOA is another essential requirement maintains the QoSS of SOA is a large challenge for the
for managing SOA security. It is advantageous to the SOA QoSS management. This is because we cannot
service provider to publish an abstract version of the describe a fine-grained QoSS for SOA unless we have a
QoSS terms for SOA that he/she offers to the consumers. good description and configuration for the main aspects
Announcing the QoSS terms in this way provides two of SOA security, including the Authentication,
basic benefits. First, the consumer knows generally what Authorization and Privacy. Thus, we have proposed in
main aspects of the SOA security requirements are prior works [8,9] two complete Authentication and
needed to let him/her access a service located at the Authorization services for SOA in addition to a promising
provider side. For example, he/she would know if the description for a new privacy metadata for SOA [10]. The
service provider is interested with the privacy terms, suggested services constitute the backbone of the
including collecting the consumer’s attributes and how proposed QoSS service as they provide the suitable
long those attributes can be stored, in order to understand values for the suggested elements inside the encapsulated
how his/her attributes will be protected. A second benefit QoSS model. Figure 2 shows a portion of the proposed
is that since the consumer already knows the general SOA SOA security framework. A brief description of each
security requirements, he/she does not have to send service is introduced as follows:
enquiry messages, reducing the demand on the service The Authentication and Security Service (NSS) [8]:
provider. Some works, such as by Ran [5], have offered a The NSS is divided into two basic parts: authentication
solution to the QoS publishing problem by extending the and intelligent security. The authentication part is
UDDI to have a further special register for the QoS terms. responsible for authenticating the service consumers that
This proposed solution makes the UDDI more complex may use diverse types of authentication tokens, such as a
and it is neither logical nor efficient to modify the UDDI username token, to identify themselves to the service
for every special publication problem. provider. The intelligent security section’s primary
In this work, we suggest a metadata for QoSS that function is to drop or accept the incoming request SOAP
includes an expressive definition for three of the message through the use of a data mining core. The
important SOA security aspects: Authentication, intelligent core produces an association rules model by
Authorization and Privacy [7]. The QoSS metadata will connecting selected metrics such as the SOAP message
be encapsulated inside a Web Service that could be easily parsing time and the request SOAP messages, with the
published and discovered by the service consumer possible web attacks. The suggested intelligent core uses
through accessing the traditional UDDI. The QoSS the produced rules for predicting web attack that may
service offers several hybrid levels of the QoSS metadata occur.
to cope with the many security requirement combinations The Authorization Service (AS) [9]: The AS is the
possible between the service provider and consumer. second intelligent service on the proposed SOA security
When the two parties agree on the proper requirements, a framework. Embedded within the AS is a 4-attribute
QoSS agreement will be produced to save and guarantee vector consisting of the attributes User, Object,
the rights of both sides. Consequently, the QoSS Environment and Condition. The interaction between the
agreement will be considered as an enforced QoSS policy authorization roles and this vector framework manages
in order to control and secure the transactions between the the access control requirements for Web Services in an
service provider and consumer. SOA environment.

654
Figure 2. A portion of the SOA Security Framework.

The proposed authorization structure is mainly easily maintained and modified without impacting other
constructed based on the definition of Attribute Role- services. All the services are loosely-coupled, where
Based Access Control (ARBAC) which has been each service executes its functionalities independently,
suggested to work mostly with Web Services [11]. This but maintain relations and exchanges messages with
ARBAC approach is a hybrid of the Role-Based Access other security services thus guaranteeing a much more
Control (RBAC) [12] and Attribute-Based Access secure environment for the service provider. Finally, the
Control (ABAC) [13] techniques. The AS also security services are designed to be abstracted services
encapsulates an intelligent mining core. This intelligent by hiding their logic and structure from the outside
core uses the centralized attributes-roles registry within world.
the AS to semi-dynamically assign the access control 2. The suggested SOA security services are easily
roles to a new user or object when added to an SOA discoverable and reusable. This means that those
environment. services can be navigated among the trusted SOA
The Privacy Service (PS) [10]: A group of rules and enterprises individually or collectively in order to
principles such as the Collection Limitation Principle and perform the task that is required of them.
the Purpose Specification Principle have been introduced 3. The security services are capable of protecting and
towards building a fine-grained privacy metadata. The securing a huge number of services offered by the
main principles are based on the fair information practices service provider [7].
developed by the Organization for Economic Co-
operation and Development (OECD) [14]. The suggested 3. The QoSS Metadata
rules are working with the principles in order to reach a
satisfied privacy plan that keeps the service provider and The following subsections demonstrate the full
consumer confident about their data safety. structure of the QoSS metadata and the suggested levels
The Service of Quality of Security Service (SQoSS): of QoSS that bridge the gap between the security
The SQoSS is generally responsible for creating a QoSS requirements of the service provider and consumer.
agreement that will be established as a policy to organize
the interaction between the service provider and 3.1 The QoSS Metadata Structure
consumer in terms of the features exposed in the
authentication, authorization and privacy services. The In this research, we propose a novel QoSS metadata
SQoSS offers several levels of QoSS to grant the security for SOA as we have added to the traditional
requirements for the service provider and consumer authentication specifications, created more attributes
together. The following sections describe in detail the describing the authorization and introduced a complete
SQoSS structure as well as the embedded operations. description for the privacy principles. The QoSS metadata
Designing and encapsulating the logic of SOA security will be encapsulated inside an agreement running as an
aspects in services have several benefits, which are: enforced policy between the service provider and
1. The suggested SOA security services maintain the consumer. To the best of our knowledge, the privacy
same characteristics of SOA. For example, each service principles have never been discussed in terms of QoSS.
is autonomous, controlling its logic and behavior so it is Also, some attributes of the QoSS metadata have been

655
constructed based on the suggested hypothesizes in our proposed QoSS metadata for SOA. Table 1 provides a
proposed SOA security framework. The metadata is fully full description for each element involved in the
described in Extensible Markup Language (XML) format suggested QoSS metadata for SOA.
which makes it easy to encapsulate in a service for secure
SOA. Figure 3 depicts the high level structure of the

Table 1. QoSS Metadata Description


Element Name Description Example
Authentication
Certificate The authentication token X.509 certificate
Digital Signature The algorithm used to sign the SOAP messages Digital Signature Algorithm
Algorithm (DSA)
Encryption Method The algorithm used to encrypt the SOAP messages Advanced Encryption Standard
(AES)
Web Attack Prediction It indicates whether the deployed security framework can predict the web The proposed NSS in this
attacks or not research.
Authorization
Technique The deployed access control type Role-Based Access Control
(RBAC)
Roles Types The types of the roles that SOA access control technique can handle The business roles
Object
ƒ Class ƒ The classification of the existing objects based on its importance for the ƒ Class A
ƒ Location service provider ƒ Business enterprise
ƒ Access time ƒ The localization of the object that the consumer would like to access SOA
ƒ The determined time in which the consumer can access the target object ƒ All day
Condition Determine who is placing the required conditions to have the consumer Local
access the object
Roles Assign Process Type Specify how the roles are assigned to the consumers Partially dynamic as within AS
Privacy
Collector Establish who can obtain and collect the consumers attributes Trusted
Data Category (What) Classify which side should specify which consumers attribute are considered User-specified
sensitive
Purpose The operation that the provider can perform on the consumer attributes Read only
Retention Time How long the provider is going to keep the consumer attributes Short
expressions that need to be explained in greater detail.
For example, in the authentication section, we add a new
element to check the ability of an SOA security
framework to predict and prevent possible web attacks. It
is an important feature to be planned to ensure the
consumer that the services he/she would like to access are
available and his/her data is in a secure server. Many new
elements have also been configured in the authorization
section. Since our proposed AS is dealing with a 4-
attribute vector structure to handle the access control for
SOA, it would be better to have many available categories
for both the service provider and consumer. This
increases the flexibility of the SOA security options and
manages the dynamic nature it possesses. The most
important element in the QoSS in terms of authorization
is the categorization of the object class or grade into a
particular level according to its importance to the service
provider. This classification will determine the degree of
the privileges that the consumer will be granted. Finally,
Figure 3. A High-level Structure of QoSS Metadata
the privacy section is built on the suggested principles in
for SOA
[14]. The proposed QoSS privacy is a very crucial section
While Table 1 clarifies most of the involved elements
since the service provider and consumer often disagree
in the QoSS metadata, we believe that there are some

656
over the amount of access to each other’s data. This attributes. The personal category can include the
problem can be solved by the inclusion of privacy in the attributes belonging to him/her as a person such as email,
QoSS and the creation of an agreement of privacy rights. address and date of birth. Meanwhile, the private category
It is of importance to note that the suggested QoSS contains information related to his/her financial data such
metadata is flexible. The elements are editable and their as social insurance number (SIN), credit card number and
values can be changed. As an example, the service bank account number. Finally, the public data contains
provider might not like to show the structure of the simple data that can be revealed publically with no
security services he/she runs, such as predicting web reservations, such as first name, last name and the
attacks or the management of authorization roles. In this consumer city. Determining which category is more
case, he/she can eliminate the elements related to that critical than the others depends on the perspective of the
information. In this paper we also classify the technique service provider or consumer.
element in the authorization section, as shown in Table 1. The service consumer is free to select any level from
This classification is based on who can define the the available four levels that are related to the three SOA
required authorization techniques that the provider should security aspects: Authentication, Authorization and
consider to manage the access rights. The service Privacy. However, the consumer selection should not
provider can change the value of the technique element conflict with the service provider security policy. This
and define another authorization technique. For example, may require that both sides go through a long and
RBAC [12] which is introduced as a value of the complicated negotiation process to establish an agreement
technique element in Table 1 may be replaced by the satisfying the security requirements of both sides. The
proposed access control technique in the work suggested agreement will be structured in XML format and saved at
by Damiani et al. [15]. the location of the service provider. The consumer can
also review this agreement and update it where possible
3.2 The QoSS Metadata Levels as needed.
An example representing the conflict that may occur
We have defined 4 different levels for each section of between the service provider and consumer is
the QoSS metadata: High, Moderate, Low and Guest. demonstrated when the service consumer selects a low
authentication level and a high authorization level in
order to be able to access the objects with a Class A
degree. The security policy created by the service
provider may refuse the consumer policy because the
objects with Class A require the consumer to be
authenticated with the available certificates in the high or
moderate authentication levels. In another example, the
consumer may choose a high or moderate authorization
level while at the same time selecting a high or moderate
privacy level. The contradiction is that the requested
authorization levels cannot work with the requested
privacy levels. The high or moderate authorization levels
mean that the consumer authorized the service provider to
collect the attributes he/she needs as the defined access
control technique in those levels are Attribute-Role Based
Access Control (ARBAC) and Attribute Based Access
Control (ABAC). On the other hand, the high and
moderate privacy levels mean that the consumer is the
Figure 4. The QoSS Metadata Levels side who determines the attributes that the service
provider should collect which creates a contradiction to
Figure 4 shows that each element in the QoSS what was previously stated by the selected authorization
metadata has a different value according to the suggested levels.
four levels. Also, as previously explained, the suggested
QoSS metadata is much more flexible and editable. As an
example to demonstrate this flexibility, the service 4. The Service of Quality of Security Service
provider and consumer may prefer another definition for (SQoSS)
the Data Category element inside the privacy section. It
may be classified into several categories such as personal, The suggested QoSS metadata needs to be placed
private and public with the regard to the service consumer inside an SOA application or component in order to gain

657
the benefits described in Section 2. Since our proposed (HTTP). An example of a request SOAP message is
SOA security framework works at the service layer, the shown in Figure 6.
QoSS metadata will be encapsulated inside an
autonomous service to manage the security requirements
between the service provider and consumer. The main
functionality beyond building the Service of Quality
Security Service (SQoSS) is producing a QoSS agreement
establishing the security requirements that the service
provider and consumer should follow. The security
services working inside the proposed SOA security
framework such as the Authentication and Security, and
Authorization Services, will organize their activities in
authenticating and authorizing the consumers based on
that QoSS agreement. Figure 5 demonstrates a portion of Figure 6. A request SOAP message.
the WSDL file of the SQoSS.
The shown request SOAP message is the initial
message that the service consumer sends to access the
SQoSS. The service consumer would be authenticated
first by a Username/Password token and authorized
second by his/her city, for example. After the QoSS
agreement is established, the service consumer must be
authenticated and authorized according to the listed QoSS
agreement items.

5. The QoSS Metadata and Service


Implementation
All the proposed security services, including the
SQoSS and the SOA security framework shown in Figure
Figure 5. A portion of the SQoSS WSDL file. 2, have been implemented using .NET technologies. All
the security databases have been constructed using SQL
As shown in Figure 5, the SQoSS has four main Server with the possibility of transforming the stored data
operations to handle the QoSS metadata. The following is in those relational stores into XML and vice versa
a description of each of those operations: according to the requirements of the situation. All the
ShowQoSSDetails: The SQoSS is being accessed as an security services are suggested to be located inside the
object. Therefore the service consumer should be Enterprise Service Bus (ESB) which manages the routing
authenticated and authorized first to call this operation in process between the service providers and consumers.
order to be able to load the details of the SQoSS. The process of establishing a QoSS agreement is
ShowQoSSConfiguration: It is responsible for described as follows:
illustrating the general configuration of the abstract QoSS 1. The service consumer first searches the UDDI
metadata that the service provider can offer for its until he/she finds the QoSS configuration that
consumer. may comply with the security requirements
ReviewAgreement: The negotiation process between the he/she needs.
service provider and consumer about the QoSS metadata 2. The consumer registers him/her self at the
is done through this operation. Once the service provider service provider by following the QoSS
and consumer establish an agreement, a QoSS agreement configuration that he/she found by searching the
is produced and saved in the database belonging to the UDDI. The registration process is completed by
SQoSS. the consumer obtaining a Username/Password
RetrieveAgreement: The service consumer can review token in addition to supplying the provider with
his/her QoSS agreement through this operation. The additional attributes, such as his/her location.
operation works automatically as the service consumer is These additional attributes help the provider
permitted the access to the SQoSS. authorize the consumer when he/she requests
The service consumer accesses the SQoSS by sending access to the SQoSS in the future.
SOAP messages over Hypertext Transfer Protocol

658
3. The service provider automatically adds any authors Mohamed et al [6], Wang et al [16] and Wang
authenticated consumer to the authorization role [17] have proposed QoSS solutions starting from a
that gives the privilege to access the SQoSS. policy-based approach and moving into encapsulating the
4. To obtain access to the SQoSS, the consumer QoSS policies inside a Quality Service. They have also
should provide the correct Username/Password defined the authorization aspect in their recent work [6].
token and the attributes he/she has previously However, they have only mentioned one authorization
provided. term, which was the possible types of the deployed access
5. Once the consumer has been granted access, control technique, such as RBAC. Moreover, they did not
he/she can evaluate and review the general take into their considerations privacy terms, as we have
QoSS configuration. This general configuration proposed in this research.
is derived from the QoSS metadata. The Larrucea and Alonso [18] have presented a modeling
consumer can then build the QoSS levels he/she framework based on the Eclipse platform for modeling
requires. Figure 7 shows the interface of the and designing security aspects in SOA. The suggested
SQoSS, including the authentication, security model is based mainly on the authentication
authorization and privacy levels where the left elements such as integrity and confidentiality, in addition
side shows the general QoSS metadata whereas to the availability in terms of authorization. This proposed
the right side shows the QoSS contact with the approach is applied on the message level and as a result
selected levels. cannot be reused or published as we have suggested in
6. The consumer submits his/her QoSS levels this work. Again, neither detailed authorization nor
he/she has selected. The SQoSS reviews the privacy has been discussed.
submitted levels for conflicts and returns Fung et al. [19] have studied the QoS management in
feedback if any are found. If no conflicts are Web Services composition. They have proposed a SOAP
found, a QoSS agreement is established and tracking model for supporting QoS end-to-end
saved. A notification message will then be sent management in the context of Web Services Business
to the consumer. The notification is also shown Process Execution Language (WSBPEL) and Service-
in the uppermost left of the screen in Figure 7. Level Agreement (SLA).
7. A negotiation process may be run between the Tian et al. [20] have proposed approaches for
service consumer and provider until both parties monitoring the QoS for Web Services. It offers the WS-
arrive at an agreement. The service consumer QoS monitor to help users check the compliance of the
can review the QoSS agreement items anytime service offer and to identify inappropriate definitions of
he/she would like. The QoSS agreement will be QoS requirements such as reliability and availability.
run as an enforced policy to manage the However, the Security in their works [19, 20] was just a
interactions between the two parties. Details of small part of their discussions on QoS for SOA. This
the agreement negotiation are beyond the scope limited view of security produces a lack of robust and
of this paper. coherent approaches for solving the real security
concerns. Moreover, the privacy terms have not been
discussed as well.
Finally, the QoSS term has been studied earlier in the
article presented by Irvine and Levin [3]. The authors
have examined the QoSS in distributed systems in
general. They presented a discussion and examples of
user-specified security variables such as the strength of a
cryptographic algorithm and the length of a cryptographic
key. Later, the QoSS definition was extended to include
other items such as the service provider and consumer
negotiations such as in the works proposed by Xia and
Hu[21] and Chen et al [22]. However, neither of those
Figure 7. A snapshot of the SQoSS Interface. works has discussed the QoSS terms as a policy
controlling the interactions between the service provider
and consumer in an SOA environment.
6. Related Work
Enormous works for QoSS for SOA have been
7. Summary and Future Work
developed by Boeing Phantom Works with their ideas
and results published in several papers [6, 16, 17]. The In this work, we have proposed a Quality of Security
Service (QoSS) metadata for SOA including several

659
elements representing the three main security SOA [10] D. S. Allison, H. F. EL Yamany, and M. A. M. Capretz, "A
aspects: Authentication, Authorization and Privacy. This Fine-Grained Privacy Structure for Service-Oriented
QoSS metadata is flexible and editable and is divided into Architecture", to appear in the Proc. of the 33rd IEEE
four basic levels: High, Moderate, Low and Guest. These International Computer Software and Applications Conference
(COMPSAC’09), Seattle, USA, July 2009.
levels allow the varied security requirements of the [11] M. Liu, H. Guo and J. Su, "An attribute and role based
service provider and consumer to be satisfied. The QoSS access control model for Web services", in the Proc. of
metadata has also been encapsulated inside an abstracted International Conference on Machine Learning and Cybernetics,
and reusable service. This helps the service provider Volume 2, 18-21 August 2005, pp. 1302–1306.
publish its QoSS configuration as well as help the [12] R. S. Sandhu, E. J. Coyne, H. L. Feinstein and C. E.
consumer find a suitable QoSS. The Service of QoSS also Youman, "Role-Based Access Control Models", IEEE
assists in establishing an agreed upon QoSS agreement Computer, Vol. 29, No. 2, February 1996, pp. 38-47.
between the service provider and consumer that will act [13] H. Shen and F. Hong, "An Attribute-based Access Control
as an enforced policy to manage the interactions between Model for Web Services", in the Proc. of the Seventh
International Conference on Parallel and Distributed
the two sides.
Computing, Applications and Technologies (PDCAT’06),
Our future work includes studying other aspects of December 2006, pp. 74-79.
SOA security such as auditing, and consequently [14] OECD Guidelines on the Protection of Privacy and
extending the proposed QoSS metadata by adding the Transborder Flows of Personal Data,
auditing features including the non-repudiation items http://www.oecd.org/document/18/0,3343,en_2649_34255_181
such as the consumers requests proofs. We also need to 5186_1_1_1_1,00.html. Last seen: April 2008.
examine the proposed QoSS metadata to check if it is [15] E. Damiani, S. D. di Vimercati, S. Paraboschi, P. Samarati,
possible to allow the consumer to select hybrid security "Fine Grained Access Control for SOAP E-Services", in the
elements from two different QoSS levels without creating Proc. of 10th International Conference on World Wide Web,
ACM, Hong Kong, May 2001, pp. 504-513.
conflicts with the service provider security policies.
[16] G. Wang, A. Chen, C. Wang, C. Fung, and S. Uczekaj,
"Integrated Quality of Service (QoS) Management in Service-
8. References Oriented Enterprise Architectures", in the Proc. of the 8th IEEE
Intl Enterprise Distributed Object Computing Conference
[1] D. Krafizg, K. Banke, and D. Slama, Enterprise SOA – (EDOC’04), California, USA, September 2004, pp. 21-32.
Service Oriented Architecture Best Practices, Pearson [17] C. Wang, G. Wang, A. Chen, H. Wang, Y. Pierce, C. Fung,
Education, Inc., USA, 2005. and S. Uczekaj, "A Policy-Based Approach for QoS
[2] E. Newcomer and G. Lomow, Understanding SOA with Specification and Enforcement in Distributed Service-Oriented
Web Services, Pearson Education, Inc., USA, 2005. Architecture", in the Proc. of the 5th IEEE International
[3] C. Irvine and T. Levin, "Quality of Security Service", in the Conference on Services Computing ( SCC’05), Florida, USA,
Proc. of 2000 workshop on New security paradigms, ACM July 2005, pp. 307-310.
press, New York, USA, 2001, pp. 91-99. [18] X. Larrucea and R. Alonso, "ISOAS: Through an
[4] M. Papazoglou, P. Traverso, S. Dustdar, F. Leymann, independent SOA Security specification", in the Proc. of the 7th
"Service-Oriented Computing: State of the Art and Research IEEE International Conference on Composition-Based Software
Challenges", IEEE Computer, Vol. 40, No. 11, November 2007, Systems (ICCBSS’08), Madrid, Spain, February 2008, pp. 92-
pp. 38-45. 100.
[5] S. Ran, "A Model for Web Services Discovery With QoS", [19] C. K. Fung, P. C.K. Hung, G. Wang, R. C. Linger, and G.
ACM SIGecom Exchanges, Vol. 4, Issue 1, Spring 2003, pp. 1- H. Walton, "A Study of Service Composition with QoS
10. Management", in the Proc. of the IEEE International Conference
[6] A. Mohamed, A. Chen, G. Wang, C. Wang, and R. Santiago, on Web Services ( ICWS’05), Florida, USA, July 2005, pp. 717-
"A Multi-Layer Security Enabled Quality of Service (QoS) 724.
Management Architecture", in the Proc. of the 11th IEEE [20] M. Tian, A. Gramn, H. Ritter, and J. Schiller, "Efficient
International Enterprise Distributed Object Computing Selection and Monitoring of QoS-aware Web services with the
Conference (EDOC’07), Maryland, USA, October 2007, pp. WS-QoS Framework", in the Proc. of the IEEE/WIC/ACM
423-434. International Conference on Web Intelligence (WI’04), Beijing,
[7] R. Kanneganti and P. Chodavarapu, SOA Security, Manning China, pp. 152-158.
Publications Co., January 2008. [21] Z. Y. Xia and Y. A. Hu, "Extending RSVP for Quality of
[8] H. F. EL Yamany, M. A. M. Capretz, "Use of Data Mining Security Service", IEEE Internet Computing, 2006, Vol. 10, No.
to Enhance Security for SOA", in the Proc. of the Third IEEE 2, pp. 51-57.
International Conference on Convergence and hybrid [22] J. Chen, X. Wang, and L. He, "An Architecture for
Information Technology (ICCIT’08), Busan, Korea, November Differentiated Security Service", in the Proc. of IEEE
2008, Vol. 1, pp. 551-558. International Symposium on Electronic Commerce and Security
[9] H. F. EL Yamany, M. A. M. Capretz, "An Authorization (ISECS’09), China, August 2008, pp. 301-304.
Model for Web Services within SOA", in the Proc. of the 3rd
IEEE International Conference on Digital Management
(ICDIM’08), London, UK, November 2008, pp. 75-80.

660

View publication stats

Вам также может понравиться