Abstract
In SOA-Security-Kompendium, a variety of security aspects to be observed with SOA based on Web services and ways to cope with them is described. Approaches to cope with security policy enforcement in general, and of Web services and business processes, in particular, being only part of what is contained there, will be discussed in this chapter. Possible methods include validation (or even verification) prior to execution, or by monitoring and intervening during execution of a program. In addition, because a BPEL-defined business process can itself be considered a Web service, approaches to specify security requirements of Web services and to solve security issues with Web services may also relate to business processes defined this way and, therefore, will be considered in this chapter, too.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Vieweg+Teubner Verlag | Springer Fachmedien Wiesbaden
About this chapter
Cite this chapter
Fischer-Hellmann, KP. (2012). Approaches to Specification and Enforcement of Security Policies. In: Bischoff, R. (eds) Information Flow Based Security Control Beyond RBAC. IT im Unternehmen, vol 1. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-8348-2618-3_3
Download citation
DOI: https://doi.org/10.1007/978-3-8348-2618-3_3
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-8348-2617-6
Online ISBN: 978-3-8348-2618-3
eBook Packages: Computer ScienceComputer Science (R0)