A Role-Based Authorization Model for Service-Oriented Architecture

Author(s):  
WenShin Hsu ◽  
JiannI Pan
Author(s):  
Karyn Welsh ◽  
Kim Hassall

Businesses use many portals and for a variety of reasons. Some portals are used for inter-organisational collaboration between suppliers, buyers, and customers or as electronic marketplaces for users to browse and search for genuine savings in the purchase of goods or services. Portals support interorganisational networks by defining function and content on the basis of the customer process, and provides availability to the user via role-based and personalised interface while e-markets offer to the user a restricted or open view of the products and services on offer. Each profile is determined by the participant or its administrator. Today’s portal technology, paired tightly with tools and services, support user activity in an integrated way. The use of portals is still in its infancy among a number of organisations while early adopters are at the point of experiencing some genuine rewards. Portal technology provides a modular service-oriented architecture for integrating content and services and for managing user profiles and security settings from other systems. Portal technology provides customers the basis for constructing, building, and deploying a variety of Web applications designed to meet the changing business requirements.


2012 ◽  
Vol 263-266 ◽  
pp. 1527-1535
Author(s):  
Ming Xiang He ◽  
Qing Ye Sun ◽  
Feng Shan ◽  
Xin Ming Lu

A maximum-meet user’s individual needs integration model was presented in this paper, which integrated information integration thinking, Web3.0 with open platform. The model embedded Service-Oriented Architecture (SOA) framework realized the information integration. Then combined the OpenID ,OAuth, and role-based access control (RBAC) achieved single sign-on and authorization system; finally, based on Maps API Mashup applications realized the interaction between the LAN Web information and maps. The model has the advantage of friendly interface, strong replicability, and high security.


Author(s):  
Khurrum Mustafa Abbasi ◽  
Irfan ul Haq ◽  
Ahmad Kamran Malik ◽  
Basit Raza ◽  
Adeel Anjum

Service-Oriented Architecture (SOA) has introduced a phenomena of system's interaction with maximum users. With the development of high speed Internet services, the use of remote devices and software has rapidly increased. It has opened new gateways for renting out resources. The Cloud Service Chain is a process of ownership transfer of a service at different levels by different service providers. The concept of service chain poses novel challenges related to security, trust and privacy of data. In this chapter, we are introducing a mechanism of access control for Cloud service chains. We have discussed the realization of Role-Based Access Control (RBAC) to services of Federated-Cloud. When services are purchased in bundle, separate SLA is signed for each. We are also going to introduce a dynamic Role-Level Agreement (RLA) for such type of access control to services. The RLA will be an aggregated SLA for different services in a role. This will be helpful for service providers and the customers to sign a single document for a bundle rather than having separate one for every service.


2021 ◽  
Author(s):  
Ye Yu

Service Oriented Architecture (SOA) changes the way of conducting business by opening their services/information to the larger business world over the networks. However, properties of "open" and "interoperable" of SOA make privacy security a sensitive issue since this architecture combines unknown individuals and individuals systems together. In SOA, service providers limit the permission of access to specific authorized individuals only, so they have to verify these individuals' identity information to decide if permission should be granted or not. On the other hand, access requestors are not willing to disclose their privacy in an open system to unknown parties. In this thesis, we present cryptography-based protocols to solve this issue of conflict. Our protocols are proposed for Role-Based Access Control (RBAC), which is a most popular access control methodology, in SOA environment. In addition, our protocols are compatible with current SOA standards and technologies such as XACML and SOAP.


2021 ◽  
Author(s):  
Ye Yu

Service Oriented Architecture (SOA) changes the way of conducting business by opening their services/information to the larger business world over the networks. However, properties of "open" and "interoperable" of SOA make privacy security a sensitive issue since this architecture combines unknown individuals and individuals systems together. In SOA, service providers limit the permission of access to specific authorized individuals only, so they have to verify these individuals' identity information to decide if permission should be granted or not. On the other hand, access requestors are not willing to disclose their privacy in an open system to unknown parties. In this thesis, we present cryptography-based protocols to solve this issue of conflict. Our protocols are proposed for Role-Based Access Control (RBAC), which is a most popular access control methodology, in SOA environment. In addition, our protocols are compatible with current SOA standards and technologies such as XACML and SOAP.


Sign in / Sign up

Export Citation Format

Share Document