2007
DOI: 10.1007/978-0-387-72367-9_34
|View full text |Cite
|
Sign up to set email alerts
|

Building a Distributed Semantic-aware Security Architecture

Abstract: Abstract. Enhancing the service-oriented architecture paradigm with semantic components is a new field of research and goal of many ongoing projects. The results lead to more powerful web applications with less development effort and better user support. While some of these advantages are without doubt novel, challenges and opportunities for the security arise. In this paper we introduce a security architecture built in a semantic service-oriented architecture. Focusing on an attributebased access control appr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
1

Year Published

2007
2007
2017
2017

Publication Types

Select...
3
1
1

Relationship

3
2

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 13 publications
0
6
0
1
Order By: Relevance
“…First ideas and the preliminary overall architecture of our security infrastructure for Access-eGov have already been presented in [4] and [5]. Similar approaches have as well been identified by [22], [23], [24].…”
Section: A Semantic Security Architecture For Web Servicesmentioning
confidence: 65%
See 2 more Smart Citations
“…First ideas and the preliminary overall architecture of our security infrastructure for Access-eGov have already been presented in [4] and [5]. Similar approaches have as well been identified by [22], [23], [24].…”
Section: A Semantic Security Architecture For Web Servicesmentioning
confidence: 65%
“…Currently available implementations of the XACML specification are for example OpenXACML 2 , enterprise-java-xacml from Google code 3 , HERAS XACML 4 , JBoss XACML 5 , and Sun's XACML 6 . At the time we started implementation we selected Sun's XACML implementation as it was the most mature one available.…”
Section: ) Xacml and Ws-xacmlmentioning
confidence: 99%
See 1 more Smart Citation
“…Eine sorgfältige Erhebung der Anforderungen von Behördenseite hat die Grenzen für die funktionale Spezifikation der für Access-eGov nötigen Komponenten ergeben [15,16]. Abbildung 4 zeigt einen Überblick über die daraus resultierende serviceorientierte Architektur.…”
Section: Einbindung In Access-egovunclassified
“…A parallel evaluation between the identified functional policy requirements and the constraints imposed by the nature of tactical SOA, was undertaken for the examination of suitable security policy frameworks. This examination included commonly used mechanisms, such as WS -Security, SAML [5], XACML [6] and Ponder [7], as well as recent semantic (REI [8], KAOS [9], ROWLBAC [10], Kolter et al [11], Trivellato et al [12]) and trust management frameworks (cassandra [13], Tulip [14], RT [15], Peer-Trust [16]). This analysis promoted the use of web ontology language (OWL) as the most suitable solution in respect to the requirements of tactical SOA.…”
Section: Introductionmentioning
confidence: 99%