Using Composition Policies to Manage Authentication and Authorization Patterns and Services.
Judith E. Y. RossebøRolv BrækPublished in: ARES (2008)
Keyphrases
- access control
- identity management
- web service composition
- web services
- trust relationships
- web services composition
- role based access control
- context aware
- service providers
- service oriented
- security requirements
- increasing number of users
- composition of web services
- service composition
- fine grained
- optimal policy
- access control policies
- mobile commerce
- data mining
- service discovery
- mission critical
- information services
- security services
- access control mechanism
- end users
- network access
- public key infrastructure
- trust negotiation