A first step towards security policy compliance of connectors

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Connectors have emerged as a powerful concept for composition and coordination of concurrent activities encapsulated as components and services. The widespread use of connectors in service-oriented applications is hindered by the lack of adequate security support. A security policy defines a set of security requirements that correspond to permissions, prohibitions and obligations to some executions when some contextual conditions are satisfied. In this paper, we propose the use of a scenario-based visual notation, called Policy Sequence Chart (PSC), for specifying security policies, and investigate an approach in which connectors are compliant with the security policies. © 2010 Springer.

Cite

CITATION STYLE

APA

Meng, S. (2010). A first step towards security policy compliance of connectors. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5961 LNCS, pp. 447–454). https://doi.org/10.1007/978-3-642-11623-0_28

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free