TY - GEN
T1 - On evolving organizational models without losing control on authorization constraints in web service orchestrations
AU - Rinderle-Ma, Stefanie
AU - Leitner, Maria
PY - 2010
Y1 - 2010
N2 - Providing adequate access control is crucial for the proper execution of any Web Service (WS) orchestration. Typically, access rules and authorization constraints are defined for a WS orchestration and are resolved over an organizational model at runtime in order to find authorized users to perform orchestration tasks. As known from many practical studies, organizational models are frequently subject to change (e.g., outsourcing or restructuring). Although the effects of organizational changes on access rules have been investigated so far, their effects on authorization constraints remain still completely unclear, albeit violating authorization constraints might lead to severe problems such as security holes. In this paper, we systematically investigate the effects of organizational changes on authorization constraints and propose different strategies to cope with possible violations. We evaluate our results along the most common types of authorization constraints and discuss the impact of the selected implementation choice.
AB - Providing adequate access control is crucial for the proper execution of any Web Service (WS) orchestration. Typically, access rules and authorization constraints are defined for a WS orchestration and are resolved over an organizational model at runtime in order to find authorized users to perform orchestration tasks. As known from many practical studies, organizational models are frequently subject to change (e.g., outsourcing or restructuring). Although the effects of organizational changes on access rules have been investigated so far, their effects on authorization constraints remain still completely unclear, albeit violating authorization constraints might lead to severe problems such as security holes. In this paper, we systematically investigate the effects of organizational changes on authorization constraints and propose different strategies to cope with possible violations. We evaluate our results along the most common types of authorization constraints and discuss the impact of the selected implementation choice.
UR - http://www.scopus.com/inward/record.url?scp=79952372864&partnerID=8YFLogxK
U2 - 10.1109/CEC.2010.17
DO - 10.1109/CEC.2010.17
M3 - Conference contribution
AN - SCOPUS:79952372864
SN - 9780769542287
T3 - Proceedings - 12th IEEE International Conference on Commerce and Enterprise Computing, CEC 2010
SP - 128
EP - 135
BT - Proceedings - 12th IEEE International Conference on Commerce and Enterprise Computing, CEC 2010
T2 - 12th IEEE Conference on Commerce and Enterprise Computing, CEC 2010
Y2 - 10 November 2010 through 12 November 2010
ER -