Checking Compatibility and Replaceability in Web Services Business Protocols with Access Control

Emad Elabd, E. Coquery, Mohand-Said Hacid
{"title":"Checking Compatibility and Replaceability in Web Services Business Protocols with Access Control","authors":"Emad Elabd, E. Coquery, Mohand-Said Hacid","doi":"10.1109/ICWS.2010.102","DOIUrl":null,"url":null,"abstract":"Recently, most enterprises adapt Web services technologies for designing and building complex inter-enterprise business applications. These applications are built by the coordination between set of Web services. Therefore, checking the compatibility between two services to guarantee that they can interact correctly is an important issue. In case of service update or replacement, there is a need for checking the replaceability to ensure that the new service is compatible with all the services which were compatible with the replaced one. These two type of checking are based on the services descriptions. Enriching services descriptions by including their behaviours is becoming more and more important. This behaviour can be described by business protocols representing the possible sequences of message exchanges. Since a lot of Web services use access control policies to restrict the access to authorized consumers, these policies should be a part of the service description. Checking compatibility and replaceability between Web services by analyzing their business protocols after assigning the access control policies is the main contribution of this work. Access control policies will be presented using ontology.","PeriodicalId":170573,"journal":{"name":"2010 IEEE International Conference on Web Services","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE International Conference on Web Services","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICWS.2010.102","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

Recently, most enterprises adapt Web services technologies for designing and building complex inter-enterprise business applications. These applications are built by the coordination between set of Web services. Therefore, checking the compatibility between two services to guarantee that they can interact correctly is an important issue. In case of service update or replacement, there is a need for checking the replaceability to ensure that the new service is compatible with all the services which were compatible with the replaced one. These two type of checking are based on the services descriptions. Enriching services descriptions by including their behaviours is becoming more and more important. This behaviour can be described by business protocols representing the possible sequences of message exchanges. Since a lot of Web services use access control policies to restrict the access to authorized consumers, these policies should be a part of the service description. Checking compatibility and replaceability between Web services by analyzing their business protocols after assigning the access control policies is the main contribution of this work. Access control policies will be presented using ontology.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用访问控制检查Web服务业务协议中的兼容性和可替换性
最近,大多数企业采用Web服务技术来设计和构建复杂的企业间业务应用程序。这些应用程序是通过一组Web服务之间的协调构建的。因此,检查两个服务之间的兼容性以保证它们能够正确交互是一个重要的问题。在服务更新或替换的情况下,需要检查可替换性,以确保新服务与与被替换的服务兼容的所有服务兼容。这两种类型的检查是基于服务描述的。通过包含服务的行为来丰富服务描述变得越来越重要。这种行为可以通过表示可能的消息交换序列的业务协议来描述。由于许多Web服务使用访问控制策略来限制对授权消费者的访问,因此这些策略应该是服务描述的一部分。在分配访问控制策略后,通过分析Web服务的业务协议来检查Web服务之间的兼容性和可替换性是这项工作的主要贡献。访问控制策略将使用本体来表示。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Everett: Providing Branch-Isolation for a Data Evolution Service Message Correlation and Web Service Protocol Mining from Inaccurate Logs QoS Aware Semantic Web Service Composition Approach Considering Pre/Postconditions Benchmarking Vulnerability Detection Tools for Web Services Service Selection Based on Customer Rating of Quality of Service Attributes
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1