Access Control in Service Compositions: Challenges and Solution Architecture

Access Control in Service Compositions: Challenges and Solution Architecture

Aurélien Faravelon, Stéphanie Chollet
ISBN13: 9781466641938|ISBN10: 1466641932|EISBN13: 9781466641945
DOI: 10.4018/978-1-4666-4193-8.ch007
Cite Chapter Cite Chapter

MLA

Faravelon, Aurélien, and Stéphanie Chollet. "Access Control in Service Compositions: Challenges and Solution Architecture." Service-Driven Approaches to Architecture and Enterprise Integration, edited by Raja Ramanathan and Kirtana Raja, IGI Global, 2013, pp. 165-187. https://doi.org/10.4018/978-1-4666-4193-8.ch007

APA

Faravelon, A. & Chollet, S. (2013). Access Control in Service Compositions: Challenges and Solution Architecture. In R. Ramanathan & K. Raja (Eds.), Service-Driven Approaches to Architecture and Enterprise Integration (pp. 165-187). IGI Global. https://doi.org/10.4018/978-1-4666-4193-8.ch007

Chicago

Faravelon, Aurélien, and Stéphanie Chollet. "Access Control in Service Compositions: Challenges and Solution Architecture." In Service-Driven Approaches to Architecture and Enterprise Integration, edited by Raja Ramanathan and Kirtana Raja, 165-187. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-4193-8.ch007

Export Reference

Mendeley
Favorite

Abstract

Pervasive applications are entering the mainstream, but at the present time, exhibit significant security weaknesses. Service-driven architectural approaches facilitate the development of pervasive applications, however, security with respect to access control and data privacy of pervasive applications are currently not managed comprehensively from design time through run time. This chapter presents a use case emphasizing the security challenges for pervasive applications and proposes a novel, generative architectural approach, to include security in pervasive applications at design time. This is a model-driven approach based on models pertaining to access control management that respect the temporal constraints relating to pervasive applications. The approach is implemented with a design and runtime environment and the results of the validation applied to the pervasive use case are presented.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.