Abstract
Collaborative business can become unreliable in terms of authorization policy conflicts, for example, when (1) incorrect role assignment or modification occurs in a service within one organization or (2) messages transferred from one organization are accessed by unqualified roles in other collaborating business partners. Therefore reliability verification based on access policies is critical for business collaboration. In this paper, a role authorization model, Role-Net, is developed based on Hierarchical Colored Petri Nets (HCPNs) to specify and manage role authorization in business collaboration and to verify collaboration reliability according to partners’ authorization policies.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Papazoglou, M.P., Georgakopoulos, D.: Service-oriented computing: Introduction. Communications of the ACM 46-10, 24–28 (2003)
Wang, X., Zhang, Y., Shi, H., Yang, J.: BPEL4RBAC: An Authorisation Specification for WS-BPEL. In: Bailey, J., Maier, D., Schewe, K.-D., Thalheim, B., Wang, X.S. (eds.) WISE 2008. LNCS, vol. 5175, pp. 381–395. Springer, Heidelberg (2008)
Ferraiolo, D., Cugini, J., Kuhn, R.: Role Based Access Control:Features and Motivations. In: Proceedings of Annual Computer Security Applications Conference. IEEE Computer Society Press, Los Alamitos (1995)
Wang, H., Cao, J., Zhang, Y.: A flexible payment scheme and its role-based access control. IEEE Transactions on Knowledge and Data Engineering 17(3), 425–436 (2005)
Bertino, E., Crampton, J., Paci, F.: Access Control and Authorization Constraints for WS-BPEL. In: Proceedings of ICWS (2006)
OASIS Web Services Business Process Execution Language (WS-BPEL) Technical Committee. Web services business process execution language version 2.0, ws-bpel (2007), http://docs.oasis-open.org/wsbpel/2.0/cs01/wsbpel-v2.0-cs01.html
Liu, P., Chen, Z.: An Access Control Model for Web Services in Business Process. In: Proceedings of WI (2004)
Knorr, K.: Dynamic Access Control through Petri Net Workflows. In: Proceedings of ACSAC (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sun, H., Wang, X., Yang, J., Zhang, Y. (2008). Authorization Policy Based Business Collaboration Reliability Verification. In: Bouguettaya, A., Krueger, I., Margaria, T. (eds) Service-Oriented Computing – ICSOC 2008. ICSOC 2008. Lecture Notes in Computer Science, vol 5364. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89652-4_49
Download citation
DOI: https://doi.org/10.1007/978-3-540-89652-4_49
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-89647-0
Online ISBN: 978-3-540-89652-4
eBook Packages: Computer ScienceComputer Science (R0)