新书推介:《语义网技术体系》
作者:瞿裕忠,胡伟,程龚
   XML论坛     W3CHINA.ORG讨论区     >>计算机科学论坛<<     SOAChina论坛     Blog     开放翻译计划     新浪微博  
 
  • 首页
  • 登录
  • 注册
  • 软件下载
  • 资料下载
  • 核心成员
  • 帮助
  •   Add to Google

    >> Web服务(Web Services,WS), 语义Web服务(Semantic Web Services, SWS)讨论区: WSDL, SOAP, UDDI, DAML-S, OWL-S, SWSF, SWSL, WSMO, WSML,BPEL, BPEL4WS, WSFL, WS-*,REST, PSL, Pi-calculus(Pi演算), Petri-net,WSRF,
    [返回] 计算机科学论坛W3CHINA.ORG讨论区 - Web新技术讨论『 Web Services & Semantic Web Services 』 → Using Semantic Rules to Determine Access Control for Web Services 查看新帖用户列表

      发表一个新主题  发表一个新投票  回复主题  (订阅本版) 您是本帖的第 4354 个阅读者浏览上一篇主题  刷新本主题   树形显示贴子 浏览下一篇主题
     * 贴子主题: Using Semantic Rules to Determine Access Control for Web Services 举报  打印  推荐  IE收藏夹 
       本主题类别:     
     flanker721 帅哥哟,离线,有人找我吗?
      
      
      等级:大一(高数修炼中)
      文章:23
      积分:189
      门派:XML.ORG.CN
      注册:2006/12/29

    姓名:(无权查看)
    城市:(无权查看)
    院校:(无权查看)
    给flanker721发送一个短消息 把flanker721加入好友 查看flanker721的个人资料 搜索flanker721在『 Web Services & Semantic Web Services 』的所有贴子 引用回复这个贴子 回复这个贴子 查看flanker721的博客楼主
    发贴心情 Using Semantic Rules to Determine Access Control for Web Services

    Using Semantic Rules to Determine Access Control for
    Web Services[/align]Brian Shields, Owen Molloy, Gerard Lyons, Jim Duggan
    [align=center]Department of Information Technology
    National University of Ireland
    Galway, Ireland
    brian.shields@geminga.it.nuigalway.ie
    fowen.molloy, gerard.lyons, jim.duggang@nuigalway.ie
    ABSTRACT

    Semantic Web technologies are bring increasingly employed
    to solve knowledge management issues in traditional Web
    technologies. This paper follows that trend and proposes
    using Semantic rule languages to construct rules for de&macr;ning
    access control rules for Web Services. Using these rules, a
    system will be able to manage access to Web Services and
    also the information accessed via these services.
    Categories and Subject Descriptors: K.6.5 [Manage-
    ment of Computing and Information Systems]: Security and
    Protection
    General Terms: Security
    Keywords: Web Service Security, Authorisation, OWL,
    SWRL
    1. INTRODUCTION
    Access to information using internet technologies is be-
    coming increasingly popular. Incorporating data security
    in application design, previously an afterthought, is now a
    priority. Security in information transport was one of the
    &macr;rst resolved, using standards such as SSL. This problem
    domain is less complex than the one we present a solution
    to in this paper. Securing information \over the wire" is a
    blanket solution, what the information is, or what it means
    is irrelevant. Securing access to this information is more dif-
    &macr;cult. Access control depends directly on what information
    is trying to be accessed, and we believe that understanding
    what this information is or means will aid its protection.
    This abstract presents a novel approach to authorisation
    in a Web Services framework. We embrace existing stan-
    dards in our solution, using standards from a number of
    &macr;elds such as Web Services, security and Semantic Web.
    1.1 Underpinning Technologies
    The Semantic Web is a family of speci&macr;cations and pro-
    posed technologies that are maturing in parallel to Web Ser-
    vices. First coined by Tim Berners-Lee at the XML 2000
    conference [5], the Semantic Web, as with Web Services, has
    consistently increased in popularity. Interest and research
    in the Semantic Web however remains primarily driven by
    Copyright is held by the author/owner.
    WWW 2006, May 23–26, 2006, Edinburgh, Scotland.
    ACM 1595933329/
    06/0005.
    the academic community.
    The Web Ontology Language (OWL) [9] is a World Wide
    Web Consortium (W3C) standard for de&macr;ning semantically
    rich languages. OWL Description Logic (OWL-DL) is a sub-
    set of OWL which guarantees completeness and decidability.
    The Semantic Web Rule Language (SWRL) [7] is a combi-
    nation of the decidable subset of OWL and the Rule Markup
    Language.
    2. IMPLEMENTATION
    It is necessary, for completion and testing of the above
    mentioned hypothesis, to develop a full security architec-
    ture. From research conducted into Web Service security
    frameworks [10] [6] [8] the principal components of a Web
    Service security architecture have been identi&macr;ed as encryp-
    tion and decryption, signing and signature veri&macr;cation, key
    management and access control.
    2.1 Web Service Security
    The security framework designed and implemented as part
    of this research is built in Java using Apache Axis as the
    SOAP implementation. The core encryption and decryption
    engine is developed using Apache's Web Service Security for
    Java (WSS4J) implementation of the WS-Security speci&macr;-
    cation from OASIS. It adheres to the W3C speci&macr;cation for
    XML-Encryption. The signing and signature veri&macr;cation en-
    gine is also developed using WSS4J and adheres to the W3C
    speci&macr;cation for XML-Signature. The key management is
    built according to the XML Key Management Speci&macr;cation
    (XKMS).
    2.2 Semantically Defined Knowledge Base
    The knowledge base which will be used in the authori-
    sation process will be de&macr;ned in OWL. This will be a de-
    scription of the information being protected. The decidable
    subset of OWL, OWL-DL, will be used to represent the in-
    formation in the system. All information does not have to
    be de&macr;ned. This information base must contain at least a
    description of Web Service endpoints along with the the de-
    scription of all the information at the level at which the
    user wants authorisation decisions to be made. This will be
    discussed more in Section 2.5.
    2.3 Semantically Defined Rules
    The rules used to de&macr;ne the access rights of individuals to
    the information represented in the knowledge base are writ-
    913
    ten in a semantically aware language. SWRL was chosen
    as the rule language in our system. The main advantage
    of using SWRL is its ability to provide support for com-
    plex relationships between properties, therefore extending
    the expressiveness of what we can de&macr;ne in OWL-DL. The
    subjects of the rules will be de&macr;ned in the knowledge base,
    as described in Section 2.2. Rules may be written to protect
    access to two speci&macr;c resources; the web service endpoints
    and the information they return. Return values from a Web
    Service call will usually di&reg;er, depending on the parameter
    list of each call.
    2.4 Evaluating Rules
    Since both the knowledge base and the authorisation rules
    are essentially written in OWL-DL, we can use an OWL-DL
    reasoning engine to evaluate the rules. The main advan-
    tage of SWRL, which was discussed in Section 2.3, can also
    present a new problem domain since it extends the expres-
    siveness of OWL-DL beyond the decidable subset of OWL.
    There are two ways in which this can be overcome. Either
    restrict the expressiveness of SWRL and use an existing rea-
    soning engine such as Pellet or Racer, or use a reasoner such
    as Hoolet which has been extended to handle SWRL rules.
    We have chosen to use the extended reasoner Hoolet. To
    ensure a decidable result from our authorisation we will re-
    strict how the user may write these rules rather than re-
    stricting the language itself.
    2.5 Document Filtering
    Authorisation decisions will &macr;rstly be made with respect
    to a Web Service endpoint. This can result in one of three
    results:
    &sup2; Requester is granted full access
    &sup2; Requester is refused any access
    &sup2; Requester is granted limited access
    A requester being granted limited access implies that they
    can access the endpoint but they will potentially be returned
    sensitive information that they do not have access to. When
    this happens, the response associated with the initial request
    is examined and the information being returned must be
    legally accessible by the requester. Any information which
    is de&macr;ned as illegal for the requester will be pruned before
    the response is sent.
    The level of pruning is de&macr;ned by the user who is re-
    sponsible for the update of the rules and knowledge stores.
    Information may only be pruned if it is de&macr;ned in the knowl-
    edge base. For example, assume the information structure
    in Figure 1 exists in the system. If the user wants to spec-
    ify that certain clients may not access Test Results then it
    must be de&macr;ned in the knowledge base. Anyone with read
    access to Clinical Information will have read access to all of
    its unde&macr;ned children.
    3. CONCLUSIONS
    There is some similar research being carried out. We have
    identi&macr;ed four projects that share some similarities to ours.
    Rei is a distributed policy language that enables every
    Web entity to specify policies for its access [1].
    Parsia et al, in [4], propose a semantically-aware policy
    language by translating WS-Policy into OWL-DL.
    Figure 1: Sample Information Structure
    Qin et al propose \an access control model for the Se-
    mantic Web that is capable of specifying authorisations over
    concepts de&macr;ned in ontologies and enforcing them upon data
    instances annotated by the concepts" [2].
    Damiani et al [3] outline how \current standard policy
    languages such as XACML can be extended" to be able to
    semantically de&macr;ne access control policies for the Semantic
    Web.
    The model proposed in this abstract di&reg;ers from each of
    these o&reg;erings. The &macr;rst two items deal with policies for
    Web Services, often confused with authorisation rules. A
    policy is the information which the owner of the service
    wishes to share with potential business partners. The &macr;nal
    two areas of research are more similar to this paper, although
    the research by Qin et al does not lend itself speci&macr;cally to
    access control for Web Services and the work of Damiani et
    al enriches XACML with RDF, RDF will not provide the
    same semantic richness as OWL.
    4. ACKNOWLEDGMENTS
    This work is funded by Enterprise Ireland as part of the
    Advanced Technology Research Program.
    5. REFERENCES
    [1] L. Kagal, T. Finin and A. Joshi. A Policy Based Approach to
    Security for the Semantic Web. 2nd International Semantic
    Web Conference, Sanibel Islands, Florida, USA, 2003.
    [2] L. Qin and V. Atluri. Concept-Level Access Control for the
    Semantic Web. ACM Workshop on XML Security, Fairfax,
    VA, USA, 2003.
    [3] E. Damiani, S. De Capatani di Vimercati, C. Fugazza and P.
    Samarati. Extending Policy Languages to the Semantic Web.
    4th International Conference on Web Engineering, Munich,
    Germany, 2004.
    [4] B. Parsia, V. Kolozski and J. Hendler. Expressing WS Policies
    in OWL. 14th International World Wide Web Conference,
    Chiba, Japan, 2005.
    [5] T. Berners-Lee. Keynote address at XML 2000.
    http://www.w3.org/2000/Talks/1206-xml2k-tbl/slide10-
    0.html,
    2000.
    [6] B. Hartman, D. J. Flinn, K. Beznosov, and S. Kawamoto.
    Mastering Web Service Security. Wiley, 2003.
    [7] I. Horrocks and et al. SWRL: A Semantic Web Rule
    Language combining OWL and RuleML, May 2004. URL:
    http://www.daml.org/2003/11/swrl/".
    [8] P. Kumar. J2EE Security For Servlets, EJBs and Web
    Services. Prentice Hall, 2004.
    [9] D. L. McGuinness and F. van Harmelen. OWL Web Ontology
    Language, February 2004. URL:
    http://www.w3.org/TR/owl-features/.
    [10] M. O'Neill. Web Services Security. McGraw-Hill/Osborne,
    2003.
    914

       收藏   分享  
    顶(0)
      




    点击查看用户来源及管理<br>发贴IP:*.*.*.* 2006/12/30 17:27:00
     
     northenstar 帅哥哟,离线,有人找我吗?
      
      
      等级:大一(高数修炼中)
      文章:21
      积分:171
      门派:XML.ORG.CN
      注册:2005/9/27

    姓名:(无权查看)
    城市:(无权查看)
    院校:(无权查看)
    给northenstar发送一个短消息 把northenstar加入好友 查看northenstar的个人资料 搜索northenstar在『 Web Services & Semantic Web Services 』的所有贴子 引用回复这个贴子 回复这个贴子 查看northenstar的博客2
    发贴心情 
    楼主,您好, 首先感谢你发的一些文章,对我的帮助不少;我最近在选择课题方向,想了解语义web服务安全相关的方面能不能进展下去,希望你能给我一些建议,同时有比较好的相关材料在给我一些^_^,十分的感谢哦
    点击查看用户来源及管理<br>发贴IP:*.*.*.* 2007/1/14 10:21:00
     
     northenstar 帅哥哟,离线,有人找我吗?
      
      
      等级:大一(高数修炼中)
      文章:21
      积分:171
      门派:XML.ORG.CN
      注册:2005/9/27

    姓名:(无权查看)
    城市:(无权查看)
    院校:(无权查看)
    给northenstar发送一个短消息 把northenstar加入好友 查看northenstar的个人资料 搜索northenstar在『 Web Services & Semantic Web Services 』的所有贴子 引用回复这个贴子 回复这个贴子 查看northenstar的博客3
    发贴心情 
    ^_^,我的邮箱是fan108@163.com,Thank you very much!^_^
    点击查看用户来源及管理<br>发贴IP:*.*.*.* 2007/1/14 10:24:00
     
     GoogleAdSense
      
      
      等级:大一新生
      文章:1
      积分:50
      门派:无门无派
      院校:未填写
      注册:2007-01-01
    给Google AdSense发送一个短消息 把Google AdSense加入好友 查看Google AdSense的个人资料 搜索Google AdSense在『 Web Services & Semantic Web Services 』的所有贴子 访问Google AdSense的主页 引用回复这个贴子 回复这个贴子 查看Google AdSense的博客广告
    2025/6/21 20:31:26

    本主题贴数3,分页: [1]

    管理选项修改tag | 锁定 | 解锁 | 提升 | 删除 | 移动 | 固顶 | 总固顶 | 奖励 | 惩罚 | 发布公告
    W3C Contributing Supporter! W 3 C h i n a ( since 2003 ) 旗 下 站 点
    苏ICP备05006046号《全国人大常委会关于维护互联网安全的决定》《计算机信息网络国际联网安全保护管理办法》
    62.500ms