dc.contributor.author |
Mourad, Azzam |
|
dc.contributor.author |
Otrok, Hadi |
|
dc.contributor.author |
Ayoubi, Sara |
|
dc.date.accessioned |
2017-03-08T13:51:42Z |
|
dc.date.available |
2017-03-08T13:51:42Z |
|
dc.date.issued |
2017-03-08 |
|
dc.identifier.isbn |
9781457714641 |
en_US |
dc.identifier.uri |
http://hdl.handle.net/10725/5334 |
|
dc.description.abstract |
In this paper, we introduce our approach for the automatic generation of BPEL (Business Process Execution Language) aspects from security policies. It is based on a synergy between policies, Aspect-Oriented Programming (AOP) and composition of web services. Our proposed approach allows first to transform security policies into BPEL aspects. Then, the generated aspects are weaved in the BPEL process of the composed web services at runtime [1]. The main contributions of our approach are: (1) Describing dynamic security policies, (2) generating automatically the BPEL aspects, (3) separating the business and security concerns of composite web services, and hence developing them separately (4) allowing the modification of the dynamic security features and web services composition at run time and (5) providing modularity for modeling cross-cutting concerns between web services. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
IEEE |
en_US |
dc.title |
Toward systematic integration of security policies into web services |
en_US |
dc.type |
Conference Paper / Proceeding |
en_US |
dc.author.school |
SAS |
en_US |
dc.author.idnumber |
200904853 |
en_US |
dc.author.department |
Computer Science and Mathematics |
en_US |
dc.description.embargo |
N/A |
en_US |
dc.keywords |
Web services |
en_US |
dc.keywords |
Authentication |
en_US |
dc.keywords |
Business |
en_US |
dc.keywords |
Weaving |
en_US |
dc.keywords |
Access control |
en_US |
dc.keywords |
Runtime |
en_US |
dc.identifier.doi |
http://dx.doi.org/10.1006/bbrc.1994.188310.1109/EISIC.2011.48 |
en_US |
dc.identifier.ctation |
Mourad, A., Otrok, H., & Ayoubi, S. (2011, September). Toward Systematic Integration of Security Policies into Web Services. In Intelligence and Security Informatics Conference (EISIC), 2011 European (pp. 220-223). IEEE. |
en_US |
dc.author.email |
azzam.mourad@lau.edu.lb |
en_US |
dc.conference.date |
12-14 Sept. 2011 |
en_US |
dc.conference.pages |
220-223 |
en_US |
dc.conference.place |
Athens, Greece |
en_US |
dc.conference.title |
2011 European Intelligence and Security Informatics Conference (EISIC) |
en_US |
dc.identifier.tou |
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php |
en_US |
dc.identifier.url |
http://ieeexplore.ieee.org/abstract/document/6061238/ |
en_US |
dc.orcid.id |
https://orcid.org/0000-0001-9434-5322 |
|
dc.publication.date |
2011 |
en_US |
dc.author.affiliation |
Lebanese American University |
en_US |