Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
Book cover

IFIP International Conference on Distributed Applications and Interoperable Systems

DAIS 2007: Distributed Applications and Interoperable Systems pp 253–266Cite as

  1. Home
  2. Distributed Applications and Interoperable Systems
  3. Conference paper
A Flexible Architecture for Enforcing and Composing Policies in a Service-Oriented Environment

A Flexible Architecture for Enforcing and Composing Policies in a Service-Oriented Environment

  • Tom Goovaerts1,
  • Bart De Win1 &
  • Wouter Joosen1 
  • Conference paper
  • 622 Accesses

  • 1 Citations

Part of the Lecture Notes in Computer Science book series (LNISA,volume 4531)

Abstract

Service Oriented Architectures (SOA’s) enable powerful application and end user service composition from independently defined services. The effective deployment of such composed services requires adaptation of and interoperability between services. This challenge can be approached by specifying service composition in policies, and by enforcing these policies in a sophisticated run-time architecture.

In this paper, we present an open architecture for enforcing and composing complex policies that can depend on the available services in the environment. Complex polices have typically been studied in the context of policy languages, yet they have never been fully supported in a SOA-based execution environment. We have created a flexible run-time architecture that maximizes interoperability, adaptability and evolution. We have prototyped our architecture on an Enterprise Service Bus and we illustrate how our solution supports realistic and complex policies.

Keywords

  • Policy Language
  • Service Composition
  • Policy Rule
  • Policy Enforcement
  • Generic Message

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Chapter PDF

Download to read the full chapter text

References

  1. Bauer, L., Ligatti, J., Walker, D.: Composing Security Policies with Polymer. In: Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, pp. 305–314 (2005)

    Google Scholar 

  2. Beznosov, K., Deng, Y., Blakley, B., Burt, C., Barkley, J.: A Resource Access Decision Service for CORBA-based Distributed Systems. In: Proceedings of the 15th Annual Computer Security Applications Conference, p. 310 (1999)

    Google Scholar 

  3. Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: Securing SOAP e-services. International Journal of Information Security 1(2), 100–115 (2002)

    CrossRef  MATH  Google Scholar 

  4. Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder Policy Specification Language. Lecture Notes in Computer Science 2001, pp. 18–38 (2001)

    Google Scholar 

  5. Dan, A., Dumitrescu, C., Ripeanu, M.: Connecting Client Objectives with Resource Capabilities: an Essential Component for Grid Service Managent Infrastructures. In: Proceedings of the 2nd International Conference on Service Oriented Computing, pp. 57–64 (2004)

    Google Scholar 

  6. D’Hondt, M., Jonckers, V.: Hybrid Aspects for Weaving Object-Oriented Functionality and Rule-Based Knowledge. In: Proceedings of the 3rd International Conference on Aspect-Oriented Software Development, pp. 132–140 (2004)

    Google Scholar 

  7. Dulay, N., Lupu, E., Sloman, M., Damianou, N.: A Policy Deployment Model for the Ponder Language. Integrated Network Management Proceedings, 2001 IEEE/IFIP International Symposium on, pp. 529–543 (2001)

    Google Scholar 

  8. The Open Group. Authorization (AZN) API. Open Group Technical Standard C908 (2000)

    Google Scholar 

  9. Interdisciplinary Institute for BroadBand Technology. T-CASE Project (Technologies and Capabilities for Service-Enabling) (2005) https://projects.ibbt.be/tcase/

  10. Kagal, L.F., Joshi, T.A.: A Policy Language for a Pervasive Computing Environment. Policies for Distributed Systems and Networks, 2003. Proceedings. POLICY 2003. IEEE 4th International Workshop on, pp. 63–74 (2003)

    Google Scholar 

  11. Kanada, Y.: Taxonomy and Description of Policy Combination Methods. In: Proceedings of the International Workshop on Policies for Distributed Systems and Networks, pp. 171–184 (2001)

    Google Scholar 

  12. Karjoth, G.: Access Control with IBM Tivoli Access Manager. ACM Transactions on Information and System Security 6(2), 232–257 (2003)

    CrossRef  Google Scholar 

  13. Kiczales, G.: Aspect-Oriented Programming. ACM Computing Surveys 28, 232–257 (1996)

    CrossRef  Google Scholar 

  14. OASIS. Security Assertion Markup Language Specification, Version 1.1 (2003)

    Google Scholar 

  15. OASIS. Web Services Security: SOAP Message Security, Version 1.0 (2004)

    Google Scholar 

  16. OASIS. eXtensible Access Control Markup Language (XACML) Version 2.0 (2005)

    Google Scholar 

  17. Papazoglou, M., Georgakopoulos, D.: Service-Oriented Computing: Introduction. Communications of the ACM, vol. 46(10) (2003)

    Google Scholar 

  18. Ritter, T., Schreiner, R., Lang, U.: Integrating Security Policies via Container Portable Interceptors. IEEE Distributed Systems Online, vol. 7 (2006)

    Google Scholar 

  19. Schlimmer, J., et al.: Web Services Policy Framework Specification, Draft Version (2004)

    Google Scholar 

  20. Schneider, F.B.: Enforceable Security Policies. ACM Transactions on Information and System Security 3(1), 30–50 (2000)

    CrossRef  MathSciNet  Google Scholar 

  21. Sun Microsystems. Java Authrozation Contract for Containers (JACC) Version 1.0 (2003)

    Google Scholar 

  22. Uszok, A., Bradshaw, J., Jeffers, R., Suri, N., Hayes, P., Breedy, M., Bunch, L., Johnson, M., Kulkarni, S., Lott, J.: KAoS Policy and Domain Services: Toward a Description-logic Approach to Policy Representation, Deconfliction, and Enforcement. Policies for Distributed Systems and Networks, 2003. Proceedings. POLICY 2003. IEEE 4th International Workshop on, pp. 93–96 (2003)

    Google Scholar 

  23. W3C. Web Services Addressing, W3C Member Submission (2004)

    Google Scholar 

  24. De Win, B.: Engineering Application-level Security through Aspect-Oriented Software development. PhD thesis, Katholieke Universiteit Leuven (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. DistriNet Research Group, Katholieke Universiteit Leuven, Celestijnenlaan 200A, 3001 Leuven, Belgium

    Tom Goovaerts, Bart De Win & Wouter Joosen

Authors
  1. Tom Goovaerts
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Bart De Win
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Wouter Joosen
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Jadwiga Indulska Kerry Raymond

Rights and permissions

Reprints and Permissions

Copyright information

© 2007 IFIP International Federation for Information Processing

About this paper

Cite this paper

Goovaerts, T., De Win, B., Joosen, W. (2007). A Flexible Architecture for Enforcing and Composing Policies in a Service-Oriented Environment. In: Indulska, J., Raymond, K. (eds) Distributed Applications and Interoperable Systems. DAIS 2007. Lecture Notes in Computer Science, vol 4531. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72883-2_19

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-540-72883-2_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72881-8

  • Online ISBN: 978-3-540-72883-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Cancel contracts here

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature