Verification of access control requirements in web services choreography

Federica Paci*, Mourad Ouzzani, Massimo Mecella

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

20 Citations (Scopus)

Abstract

Web services choreography is used to design peer-to-peer applications where each peer is potentially a Web service. It defines the required behavior of participating Web services along with their interactions through message exchanges. Implementing a complex system described by a choreography requires selecting actual Web services whose individual behaviors are compatible with the overall behavior described by the choreography. Although the selected Web services implement the specified behavior, they may not be able to interact due to the policies they enforce to protect their resources. A Web service'resource can be an operation or a credential type to be submitted to be able to invoke an operation. In this paper, we propose a novel approach to determine at design time whether a choreography can be implemented by a set of Web services based on their access control policies and the disclosure policies regulating the release of their credentials. We model both Web services and Web services choreography as transition systems and represent Web services credential disclosure policies as directed graphs. We then verify that all possible conversations of the Web services choreography can be implemented by matching credential disclosure policies of the invoker Web service with the access control policy of the Web services being invoked. We propose a resource release graph to enable this verification.

Original languageEnglish
Title of host publicationProceedings - 2008 IEEE International Conference on Services Computing, SCC 2008
PublisherIEEE Computer Society
Pages5-12
Number of pages8
ISBN (Print)9780769532837
DOIs
Publication statusPublished - 2008
Externally publishedYes
Event2008 IEEE International Conference on Services Computing, SCC 2008 - Honolulu, HI, United States
Duration: 7 Jul 200811 Jul 2008

Publication series

NameProceedings - 2008 IEEE International Conference on Services Computing, SCC 2008
Volume1

Conference

Conference2008 IEEE International Conference on Services Computing, SCC 2008
Country/TerritoryUnited States
CityHonolulu, HI
Period7/07/0811/07/08

Fingerprint

Dive into the research topics of 'Verification of access control requirements in web services choreography'. Together they form a unique fingerprint.

Cite this