A technical architecture for enforcing usage control requirements in service-oriented architectures

Agreiter Berthold, Muhammad Alam, Ruth Breu, Michael Hafner, Alexander Pretschner, Jean Pierre Seifert, Xinwen Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

12 Scopus citations

Abstract

We present an approach to modeling and enforcing usage control requirements on remote clients in service-oriented architectures. Technically, this is done by leveraging a trusted software stack relying on a hardware-based root of trust and a trusted Java virtual machine to create a measurable and hence trust worthy client-side application environment. We define a model-driven approach to specifying remote policies that makes the technical intricacies of the target platform transparent to the policy modeler.

Original languageEnglish
Title of host publicationSWS'07 - Proceedings of the 2007 ACM Workshop on Secure Web Services
Pages18-25
Number of pages8
DOIs
StatePublished - 2007
Externally publishedYes
EventACM Workshop on Web Service Security, SWS 2007 - Fairfax, VA, United States
Duration: 2 Nov 20072 Nov 2007

Publication series

NameSWS'07 - Proceedings of the 2007 ACM Workshop on Secure Web Services

Conference

ConferenceACM Workshop on Web Service Security, SWS 2007
Country/TerritoryUnited States
CityFairfax, VA
Period2/11/072/11/07

Keywords

  • SOA
  • access control
  • policies
  • trusted computing
  • usage control

Fingerprint

Dive into the research topics of 'A technical architecture for enforcing usage control requirements in service-oriented architectures'. Together they form a unique fingerprint.

Cite this