TY - GEN
T1 - Optimized workflow authorization in service oriented architectures
AU - Wimmer, Martin
AU - Albutiu, Martina Cezara
AU - Kemper, Alfons
PY - 2006
Y1 - 2006
N2 - Complex business processes are usually realized by specifying the integration and interaction of smaller modular software components. For example, hitherto monolithic enterprise resource planning systems (ERP) are decomposed into Web services which are then again orchestrated in terms of Web service workflows, bringing about higher levels of flexibility and adaptability. In general, such services constitute autonomous software components with their own dedicated security requirements. In this paper we present our approach for consolidating the access control of (Web service) workflows. The proposed security engineering method allows, first, to determine for whom workflows are executable from a privileges point of view, second, to assess compliance with the principle of least privilege, and, third, helps to reduce policy enforcement costs.
AB - Complex business processes are usually realized by specifying the integration and interaction of smaller modular software components. For example, hitherto monolithic enterprise resource planning systems (ERP) are decomposed into Web services which are then again orchestrated in terms of Web service workflows, bringing about higher levels of flexibility and adaptability. In general, such services constitute autonomous software components with their own dedicated security requirements. In this paper we present our approach for consolidating the access control of (Web service) workflows. The proposed security engineering method allows, first, to determine for whom workflows are executable from a privileges point of view, second, to assess compliance with the principle of least privilege, and, third, helps to reduce policy enforcement costs.
UR - http://www.scopus.com/inward/record.url?scp=33746614321&partnerID=8YFLogxK
U2 - 10.1007/11766155_3
DO - 10.1007/11766155_3
M3 - Conference contribution
AN - SCOPUS:33746614321
SN - 3540346406
SN - 9783540346401
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 30
EP - 44
BT - Emerging Trends in Information and Communication Security - International Conference, ETRICS 2006, Proceedings
PB - Springer Verlag
T2 - International Conference on Emerging Trends in Information and Communication Security, ETRICS 2006
Y2 - 6 June 2006 through 9 June 2006
ER -