On evolving organizational models without losing control on authorization constraints in web service orchestrations

Stefanie Rinderle-Ma, Maria Leitner

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

Providing adequate access control is crucial for the proper execution of any Web Service (WS) orchestration. Typically, access rules and authorization constraints are defined for a WS orchestration and are resolved over an organizational model at runtime in order to find authorized users to perform orchestration tasks. As known from many practical studies, organizational models are frequently subject to change (e.g., outsourcing or restructuring). Although the effects of organizational changes on access rules have been investigated so far, their effects on authorization constraints remain still completely unclear, albeit violating authorization constraints might lead to severe problems such as security holes. In this paper, we systematically investigate the effects of organizational changes on authorization constraints and propose different strategies to cope with possible violations. We evaluate our results along the most common types of authorization constraints and discuss the impact of the selected implementation choice.

Original languageEnglish
Title of host publicationProceedings - 12th IEEE International Conference on Commerce and Enterprise Computing, CEC 2010
Pages128-135
Number of pages8
DOIs
StatePublished - 2010
Externally publishedYes
Event12th IEEE Conference on Commerce and Enterprise Computing, CEC 2010 - Shanghai, China
Duration: 10 Nov 201012 Nov 2010

Publication series

NameProceedings - 12th IEEE International Conference on Commerce and Enterprise Computing, CEC 2010

Conference

Conference12th IEEE Conference on Commerce and Enterprise Computing, CEC 2010
Country/TerritoryChina
CityShanghai
Period10/11/1012/11/10

Fingerprint

Dive into the research topics of 'On evolving organizational models without losing control on authorization constraints in web service orchestrations'. Together they form a unique fingerprint.

Cite this