Open Access Open Access  Restricted Access Subscription or Fee Access

RBAC Framework for Web Based Services in Work Flow Foundation

J. Ramkumar

Abstract


In the business process, Work Flow foundation supports windows environment and control the order in which the pages shown. Then the individual Web pages services are integrated using Work Flow and invoke those services, knitting them together into a composite application. Based on role provisioning, the employees are allowed inside the organization and services are initiated. We used two protocols (Aggregate Zero Knowledge Proof Knowledge and Oblivious Commitment Protocols) to choose an appropriate person to a particular role. Enforcement point act as server to provide services to work and provide security based on Cryptographic algorithm and other xml language (authentication access). In this approach, alternate BPEL process is Workflow Foundation with RSA algorithm with 1024 bits is used. XACML is used to provide and strengthened the security level of the business organization. These changes provide flexibility and services in less expensive manner.

Keywords


Aggregate Zero Knowledge Proof Knowledge, Oblivious Commitment Based Envelope, Extensible Access Control Markup Language

Full Text:

PDF

References


H.Khambhammettu , ―On delegation and workflow execution models,‖ in proceedings of 21st ACM Symposium on Applied Computing, pp. 2137-2144, 2008.

L.Chen , ―On spatio-temporal constraints and inheritance in role-based control,‖ in Proceedings of ACM Symposium on information, computer and communications security (ASIACCS 08), pp. 205-216, 2008.

H.khambhammettu, ―Delegation and satisfiability in Workflow system,‖ in Proceedings of 13th ACM Symposium on Access Control Models and Technologies, pp. 31-40, 2008.

Q. Wei, K.Beznosov and M. Ripeanu ,― Auhtorization recycling in RBAC systems,‖ in Proceedings of 13th ACM Symposium on Access Control Models and Technologies, pp. 63-72, 2008.

M. Dekker and S.Etalle, ― RBAC administration in distributed systems,‖ in proceedings of 13th ACM Symposium on Access Control Models and Technologies, pp. 93-102, 2008.

SHEN Hai-bo and HONG Fan,‖An Attribute-Based Access Control Model for Web Services,‖ Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06), pp.74-79, Dec.2006.

Qiang Duan Inf. Sci. & Technol. Dept., Pennsylvania State Univ., Abington, PA, USA, ‖Modeling and Analysis of End-to-End Quality of Service Provisioning in Virtualization-Based Future Internet,‖ Computer Communications and Networks (ICCCN), 2010 Proceedings of 19th International Conference, Issue: 2-5, pp. 1-6, Aug. 2010.

Min Xu1, Duminda Wijesekera1 and Xinwen Zhang,‖Runtime Administration of RBAC Profile for XACML,‖ IETRANSACTIONS ON SERVICES COMPUTING Vol. PP, pp.1-1, 2010.

R. Dongwan Shin Dept. of Comput. Sci., New Mexico Tech, Socorro, NM,‖ Controlled sharing of identity attributes for better privacy Lopes,‖ Collaborative Computing: Networking, Applications and Worksharing, 2007. CollaborateCom 2007. International Conference, Issue: 12-15, pp. 2-7, Nov. 2007.

Jin, Z.P. Jian Xu Ming Xu Ning Zheng Comput. Sci. Dept.,Hangzhou Dianzi Technol. Univ., Hangzhou, China, ―An Attribute-Oriented Model for Identity Management,‖ International Conference e-Education, e-Business, e-Management, and e-Learning, 2010. IC4E '10, Issue: 22-24, pp. 440-444, Jan 2010.

Sakai, R.Osaka Electro-Commun. Univ., Neyagawa, ―Flexible identity based attribute encryption from identity based broadcast encryption,‖ International Symposium on Information Theory and Its Applications, 2008. ISITA 2008. Issue: 7-10, pp. 1-4, Dec. 2008.

Qinqin Ni Weizhen Sun Xu Liang. Dept. of Comput. Sci. & Technol., Capital Normal Univ., Beijing, China.‖ Using RBAC to Enforce Solaris System Security,‖ IEEE International Conference on e-Business Engineering, 2008. ICEBE '08. Issue: 22-24, pp. 455, Oct. 2008.

Xu Heng Sch. of Manage., Henan Univ. of Technol., Zhengzhou, China.‖ Knowledge Sharing Model in Collaborative Product Design Based on Role-Based Access Control and Ontology,‖Security & Privacy, IEEE. Issue: 1, Vol: 6, pp. 84,Jan - Feb. 2008.

Bertino, E. Terzi, E. Kamra, A. Vakali, A. Purdue Univ., West Lafayette.‖ Intrusion detection in RBAC-administered databases,‖2nd International Conference on e-Business and Information System Security (EBISS), 2010‖PP. 1, 27 May. 2010.

Wei Shi Jian Wu Ying Li Zhaohui Wu Bo Wang Zhejiang Univ., Hangzhou.‖ Using Improved FOAF to Enhance BPEL-extracted RBAC Capability,‖ 21st Annual Conference on Computer Security Applications. Issue: 5-9, pp. 10, Dec. 2005.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.