Enforcing ASTD Access-Control Policies with WS-BPEL Processes in SOA Environments

Enforcing ASTD Access-Control Policies with WS-BPEL Processes in SOA Environments

Michel Embe Jiague, Marc Frappier, Frédéric Gervais, Régine Laleau, Richard St-Denis
ISBN13: 9781466624702|ISBN10: 1466624701|EISBN13: 9781466624719
DOI: 10.4018/978-1-4666-2470-2.ch014
Cite Chapter Cite Chapter

MLA

Jiague, Michel Embe, et al. "Enforcing ASTD Access-Control Policies with WS-BPEL Processes in SOA Environments." Mobile and Web Innovations in Systems and Service-Oriented Engineering, edited by Dickson K.W. Chiu, IGI Global, 2013, pp. 252-273. https://doi.org/10.4018/978-1-4666-2470-2.ch014

APA

Jiague, M. E., Frappier, M., Gervais, F., Laleau, R., & St-Denis, R. (2013). Enforcing ASTD Access-Control Policies with WS-BPEL Processes in SOA Environments. In D. Chiu (Ed.), Mobile and Web Innovations in Systems and Service-Oriented Engineering (pp. 252-273). IGI Global. https://doi.org/10.4018/978-1-4666-2470-2.ch014

Chicago

Jiague, Michel Embe, et al. "Enforcing ASTD Access-Control Policies with WS-BPEL Processes in SOA Environments." In Mobile and Web Innovations in Systems and Service-Oriented Engineering, edited by Dickson K.W. Chiu, 252-273. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-2470-2.ch014

Export Reference

Mendeley
Favorite

Abstract

Controlling access to the Web services of public agencies and private corporations depends primarily on specifying and deploying functional security rules to satisfy strict regulations imposed by governments, particularly in the financial and health sectors. This paper focuses on one aspect of the SELKIS and EB3SEC projects related to the security of Web-based information systems, namely, the automatic transformation of security rules into WS-BPEL (or BPEL, for short) processes. The former are instantiated from security-rule patterns written in a graphical notation, called ASTD that is close to statecharts. The latter are executed by a BPEL engine integrated into a policy decision point, which is a component of a policy enforcement manager similar to that proposed in the XACML standard.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.