2009
DOI: 10.1007/s12394-009-0031-5
|View full text |Cite
|
Sign up to set email alerts
|

Delegation of access rights in multi-domain service compositions

Abstract: Today, it becomes more and more common to combine services from different providers into one application. Service composition is however difficult and cumbersome when there is no common trust anchor. Hence, delegation of access rights across trust domains will become essential in service composition scenarios. This article specifies abstract delegation, discusses theoretical aspects of the concept, and provides technical details of a validation implementation supporting a variety of access controls and associa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 16 publications
0
8
0
Order By: Relevance
“…Machine to Machine: This form of delegation is performed between two software applications (or agents), where one application delegate its gained privileges to another application. This form may be performed for authentication in service composition scenario [15] as shown in Fig. 3, where Facebook delegate subset of rights to Skype, on user data with the consent of user.…”
Section: A Delegation Formsmentioning
confidence: 99%
See 2 more Smart Citations
“…Machine to Machine: This form of delegation is performed between two software applications (or agents), where one application delegate its gained privileges to another application. This form may be performed for authentication in service composition scenario [15] as shown in Fig. 3, where Facebook delegate subset of rights to Skype, on user data with the consent of user.…”
Section: A Delegation Formsmentioning
confidence: 99%
“…"Revocation" is used to take away delegated rights from delegatee in two ways namely; forced revocation or auto revocation [15]. In forced revocation, delegator can revoke delegated privileges any time he wants.…”
Section: G Delegation Characteristicsmentioning
confidence: 99%
See 1 more Smart Citation
“…Distributed approaches usually introduce sophisticated architecture layers and coordinative protocols that service providers must implement to establish integrated interaction [3,12,18]. The information flow control in distributed approach is enforced in a distributed manner.…”
Section: Related Workmentioning
confidence: 99%
“…A common principle is to dynamically bind services hosted in different security domains and by different legal entities. We refer to this as "cross-domain service composition" [7]. In many cases, a distributed system might involve the processing of personal data and thus requires privacy-enhancing technologies [16].…”
Section: Motivationmentioning
confidence: 99%