Security policy specification and integration in business collaboration

Disy Daiqin He*, Jian Yang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

11 Citations (Scopus)
74 Downloads (Pure)

Abstract

Service Oriented Computing (SOC) has provided a promising architectural for business collaboration. However challenging security issues concerning business collaboration have arisen because of its dynamic and loosely coupling nature. An important problem is how to specify security policies that belong to different application domains and integrate them to satisfy the requirements of the collaboration. In this paper we will provide analysis on authorization policy requirements for business collaboration, collaboration patterns and various security comparability and integration issues. We believe it is a first step toward a framework for modeling, specifying and handling authorization control for business collaboration.

Original languageEnglish
Title of host publicationProceedings - 2007 IEEE International Conference on Services Computing, SCC 2007
EditorsL. J. Zhang, Wil van der Aalst, Patrick C. K. Hung
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages20-27
Number of pages8
ISBN (Print)0769529259, 9780769529257
DOIs
Publication statusPublished - 2007
Event2007 IEEE International Conference on Services Computing, SCC 2007 - Salt Lake City, UT, United States
Duration: 9 Jul 200713 Jul 2007

Other

Other2007 IEEE International Conference on Services Computing, SCC 2007
Country/TerritoryUnited States
CitySalt Lake City, UT
Period9/07/0713/07/07

Bibliographical note

Copyright 2007 IEEE. Reprinted from Proceedings of 2007 IEEE international conference on services computing (SCC 2007). This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Macquarie University’s products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.

Fingerprint

Dive into the research topics of 'Security policy specification and integration in business collaboration'. Together they form a unique fingerprint.

Cite this