A Policy Language for Adaptive Web Services Security Framework

How to resolve access control on Web services has become one of the important research tasks about the application of Web services. In this paper, we propose a policy based adaptive Web services security framework. In this framework, the ReiT policy is a declarative language based on the rules and ontologies. The non-structural knowledge is represented by rules and the structural temporal knowledge is represented by ontology. Moreover, we propose a mixer reasoning mechanism to evaluate the ReiT policy. The access control policy including the context of the user and Web services is evaluated by the reasoner. According to the evaluated result agent authorizes the access control of the Web services.

[1]  Henry Leung,et al.  Spread-spectrum image encoding and decoding using ergodic chaos , 2003, IEEE Trans. Consumer Electron..

[2]  Jeffrey M. Bradshaw,et al.  Semantic Web Languages for Policy Representation and Reasoning: A Comparison of KAoS, Rei, and Ponder , 2003, SEMWEB.

[3]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[4]  Stefania Bandini,et al.  Web sites as agents' environments: General framework and applications , 2006 .

[5]  Jerry R. Hobbs,et al.  An ontology of time for the semantic web , 2004, TALIP.

[6]  Antonello Monti,et al.  A polynomial chaos approach to measurement uncertainty , 2005, IEEE Transactions on Instrumentation and Measurement.

[7]  Timothy W. Finin,et al.  A policy language for a pervasive computing environment , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.

[8]  Carlos Maziero,et al.  A Policy Based Framework for Access Control , 2003, ICICS.

[9]  Fabien Michel,et al.  Environments for Multi-Agent Systems III , 2008 .

[10]  Emil C. Lupu,et al.  The Ponder Policy Specification Language , 2001, POLICY.

[11]  Michiharu Kudo PBAC: Provision-based access control model , 2002, International Journal of Information Security.

[12]  Seog Park,et al.  Task-role-based access control model , 2003, Inf. Syst..

[13]  Vadim S. Anishchenko,et al.  Controlling spatiotemporal chaos in a chain of the coupled logistic maps , 1995 .

[14]  Yuan Chun Chaos Based Encryption Algorithm for Compressed Video , 2004 .

[15]  Pramod K. Varshney,et al.  Logistic Regression for Feature Selection and Soft Classification of Remote Sensing Data , 2006, IEEE Geoscience and Remote Sensing Letters.