2010
DOI: 10.1016/j.infsof.2009.10.005
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent security and access control framework for service-oriented architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…The term 'sid' refers to the service's ID number. We assume that the security and privacy SSTM ratings are obtained from security and privacy rating systems (El Yamany et al, 2010;Allison et al, 2009;Anisetti et al, 2012) and, for simplicity, use a two-scale rating of either 1 or 10, i.e, T SSTMsec ¼ 1 or T SSTMsec ¼ 10.…”
Section: Methodsmentioning
confidence: 99%
“…The term 'sid' refers to the service's ID number. We assume that the security and privacy SSTM ratings are obtained from security and privacy rating systems (El Yamany et al, 2010;Allison et al, 2009;Anisetti et al, 2012) and, for simplicity, use a two-scale rating of either 1 or 10, i.e, T SSTMsec ¼ 1 or T SSTMsec ¼ 10.…”
Section: Methodsmentioning
confidence: 99%
“…Akin to what we are proposing for cloud, Yamany et al [37] presented an intelligent service-oriented architecture security framework, which includes authentication and security service (NSS), as well as the authorization service (AS), based on the WS-* security standards. Similarly, Song et al [38] proposed a generic framework of dataprotection-as-service (DPaaS), which integrates various protection modules including access control, key management, and logging, to provide a combined multi-tier protection mechanisms for the current cloud.…”
Section: Security-as-a-service Solutions For Cloud Databasesmentioning
confidence: 99%
“…Similarly, Song et al [38] proposed a generic framework of dataprotection-as-service (DPaaS), which integrates various protection modules including access control, key management, and logging, to provide a combined multi-tier protection mechanisms for the current cloud. This, like [37], is just a concept that aims to provide integrity, privacy, confidentiality, and fine-grained access control in cloud. In particular, these methods do not target NoSQL databases.…”
Section: Security-as-a-service Solutions For Cloud Databasesmentioning
confidence: 99%
“…Since WSN systems have similar security characteristics with the exisitng network-based software system like web-services, cloud computing, it is meaningful that the security specifications at each layer [7,21] in Service-oriented Architecture (SOA) is reviewed. The security specifications at each layer in SOA is represneted in Fig.…”
Section: Security Consideration For Each Step In Software Developmentmentioning
confidence: 99%
“…Cloud computing security should also be guided in this regard in order to become an effective and secure technology solution [6]. [7,21] permissions may be granted. Identification and authentication process are targeted at verifying and validating individual cloud users by implementing username and password protections to their cloud profiles.…”
Section: Security Attributes For Cloud Computing Systemmentioning
confidence: 99%