skip to main content
10.1145/988672.988680acmconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
Article

Trust-serv: model-driven lifecycle management of trust negotiation policies for web services

Published: 17 May 2004 Publication History

Abstract

A scalable approach to trust negotiation is required in Web service environments that have large and dynamic requester populations. We introduce Trust-Serv, a model-driven trust negotiation framework for Web services. The framework employs a model for trust negotiation that is based on state machines, extended with security abstractions. Our policy model supports lifecycle management, an important trait in the dynamic environments that characterize Web services. In particular, we provide a set of change operations to modify policies, and migration strategies that permit ongoing negotiations to be migrated to new policies without being disrupted. Experimental results show the performance benefit of these strategies. The proposed approach has been implemented as a container-centric mechanism that is transparent to the Web services and to the developers of Web services, simplifying Web service development and management as well as enabling scalable deployments.

References

[1]
B. Benatallah, Q. Z. Sheng, and M. Dumas. The Self-Serv Environment for Web Services Composition. IEEE Internet Computing, 7(1):40--48, Jan./Feb. 2003.
[2]
E. Bertino, E. Ferrari, and V. Atluri. The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Trans. Information and System Security (TISSEC), 2(1):65--104, Feb. 2002.
[3]
E. Bertino, E. Ferrari, and A. C. Squicciarini. 967;TNL: An XML-based Language for Trust Negotiations. In Proc. 4th Int'l. Workshop Policies for Distributed Systems and Networks (POLICY'03), June 2003.
[4]
C. Bettini et al. Provisions and Obligations in Policy Management and Security Applications. In Proc. 28th Conf. Very Large Data Bases (VLDB '02), Aug. 2002.
[5]
P. Bonatti and P. Samarati. A Unified Framework for Regulating Access and Information Release on the Web. J. Computer Security, 10(3):241--272, 2002.
[6]
F. Casati et al. Workflow Evolution. Data and Knowledge Eng., 24(3):211--238, Jan. 1998.
[7]
F. Curbera et al. Unraveling the Web Services Web: An Introduction to SOAP, WSDL, and UDDI. IEEE Internet Computing, 6(2):86--93, Mar./Apr. 2002.
[8]
D. Ferraiolo et al. Proposed NIST Standard for Role-Based Access Control. ACM Trans. Information and System Security (TISSEC), 4(3):224--274, Aug. 2001.
[9]
T. Grandison and M. Sloman. A Survey of Trust in Internet Applications. IEEE Comm. Surveys & Tutorials, 3(4), 2000.
[10]
A. Herzberg et al. Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers. In Proc. IEEE Symp. Security and Privacy, May 2000.
[11]
R. Housley et al. Internet X.509 Public Key Infrastructure Certificate and CRL Profile. IETF RFC 2459, Jan. 1999.
[12]
N. Li and J. Mitchell. RT: A Role-based Trust-management Framework. In Proc. 3rd DARPA Information Survivability Conf. and Exposition (DISCEX '03), Apr. 2003.
[13]
C.-T. Liu, S.-K. Chang, and P. Chrysanthis. Database schema evolution using EVER diagrams. In Proc. ACM Workshop Advanced Visual Interfaces (AVI '94), June 1994.
[14]
J. Rees, S. Bandyopadhyay, and E. H. Spafford. PFIRES: A Policy Framework for Information Security. Comm. ACM, 46(7):101--106, July 2003.
[15]
H. Skogsrud, B. Benatallah, and F. Casati. Model-Driven Trust Negotiation for Web Services. IEEE Internet Computing, 7(6):45--52, Nov./Dec. 2003.
[16]
S. Thatte, ed. Business Process Execution Language for Web Services (BPEL4WS), Version 1.1. www-106.ibm.com/ developerworks/library/ws-bpel, May 2003.
[17]
T. Yu, M. Winslett, and K. Seamons. Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies for Automated Trust Negotiation. ACM Trans. Information and System Security (TISSEC), 6(1), Feb. 2003.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WWW '04: Proceedings of the 13th international conference on World Wide Web
May 2004
754 pages
ISBN:158113844X
DOI:10.1145/988672
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 May 2004

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. conceptual modeling
  2. lifecycle management
  3. trust negotiation
  4. web services

Qualifiers

  • Article

Conference

WWW04
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media