Finite State Machine Oriented Security Policy Composition for Composite Web Services

Download Now
Provided by: IJAIR
Topic: Security
Format: PDF
Internet based applications now-a-days focus majorly on how to compose web services with different root domains to exactly match the service requestor's need. Security in the access of the integrated composite service is an important non-functional requirement in order to achieve a successful and complete business-to-business application. In the authors' paper they target on how to satisfy the security requirements for the composite web service by means of the policy based approach. Policies give the regulations that either approve or reject a behavioral deed.
Download Now

Find By Topic