.

Toward systematic integration of security policies into web services

LAUR Repository

Show simple item record

dc.contributor.author Mourad, Azzam
dc.contributor.author Otrok, Hadi
dc.contributor.author Ayoubi, Sara
dc.date.accessioned 2017-03-08T13:51:42Z
dc.date.available 2017-03-08T13:51:42Z
dc.date.issued 2017-03-08
dc.identifier.isbn 9781457714641 en_US
dc.identifier.uri http://hdl.handle.net/10725/5334
dc.description.abstract In this paper, we introduce our approach for the automatic generation of BPEL (Business Process Execution Language) aspects from security policies. It is based on a synergy between policies, Aspect-Oriented Programming (AOP) and composition of web services. Our proposed approach allows first to transform security policies into BPEL aspects. Then, the generated aspects are weaved in the BPEL process of the composed web services at runtime [1]. The main contributions of our approach are: (1) Describing dynamic security policies, (2) generating automatically the BPEL aspects, (3) separating the business and security concerns of composite web services, and hence developing them separately (4) allowing the modification of the dynamic security features and web services composition at run time and (5) providing modularity for modeling cross-cutting concerns between web services. en_US
dc.language.iso en en_US
dc.publisher IEEE en_US
dc.title Toward systematic integration of security policies into web services en_US
dc.type Conference Paper / Proceeding en_US
dc.author.school SAS en_US
dc.author.idnumber 200904853 en_US
dc.author.department Computer Science and Mathematics en_US
dc.description.embargo N/A en_US
dc.keywords Web services en_US
dc.keywords Authentication en_US
dc.keywords Business en_US
dc.keywords Weaving en_US
dc.keywords Access control en_US
dc.keywords Runtime en_US
dc.identifier.doi http://dx.doi.org/10.1006/bbrc.1994.188310.1109/EISIC.2011.48 en_US
dc.identifier.ctation Mourad, A., Otrok, H., & Ayoubi, S. (2011, September). Toward Systematic Integration of Security Policies into Web Services. In Intelligence and Security Informatics Conference (EISIC), 2011 European (pp. 220-223). IEEE. en_US
dc.author.email azzam.mourad@lau.edu.lb en_US
dc.conference.date 12-14 Sept. 2011 en_US
dc.conference.pages 220-223 en_US
dc.conference.place Athens, Greece en_US
dc.conference.title 2011 European Intelligence and Security Informatics Conference (EISIC) en_US
dc.identifier.tou http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php en_US
dc.identifier.url http://ieeexplore.ieee.org/abstract/document/6061238/ en_US
dc.orcid.id https://orcid.org/0000-0001-9434-5322
dc.publication.date 2011 en_US
dc.author.affiliation Lebanese American University en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search LAUR


Advanced Search

Browse

My Account