以文本方式查看主题

-  计算机科学论坛  (http://bbs.xml.org.cn/index.asp)
--  『 Web Services & Semantic Web Services 』  (http://bbs.xml.org.cn/list.asp?boardid=10)
----  Using Semantic Rules to Determine Access Control for Web Services  (http://bbs.xml.org.cn/dispbbs.asp?boardid=10&rootid=&id=41801)


--  作者:flanker721
--  发布时间:12/30/2006 5:27:00 PM

--  Using Semantic Rules to Determine Access Control for Web Services
Using Semantic Rules to Determine Access Control for
Web Services[/align]Brian Shields, Owen Molloy, Gerard Lyons, Jim Duggan
[align=center]Department of Information Technology
National University of Ireland
Galway, Ireland
brian.shields@geminga.it.nuigalway.ie
fowen.molloy, gerard.lyons, jim.duggang@nuigalway.ie
ABSTRACT

Semantic Web technologies are bring increasingly employed
to solve knowledge management issues in traditional Web
technologies. This paper follows that trend and proposes
using Semantic rule languages to construct rules for de¯ning
access control rules for Web Services. Using these rules, a
system will be able to manage access to Web Services and
also the information accessed via these services.
Categories and Subject Descriptors: K.6.5 [Manage-
ment of Computing and Information Systems]: Security and
Protection
General Terms: Security
Keywords: Web Service Security, Authorisation, OWL,
SWRL
1. INTRODUCTION
Access to information using internet technologies is be-
coming increasingly popular. Incorporating data security
in application design, previously an afterthought, is now a
priority. Security in information transport was one of the
¯rst resolved, using standards such as SSL. This problem
domain is less complex than the one we present a solution
to in this paper. Securing information \over the wire" is a
blanket solution, what the information is, or what it means
is irrelevant. Securing access to this information is more dif-
¯cult. Access control depends directly on what information
is trying to be accessed, and we believe that understanding
what this information is or means will aid its protection.
This abstract presents a novel approach to authorisation
in a Web Services framework. We embrace existing stan-
dards in our solution, using standards from a number of
¯elds such as Web Services, security and Semantic Web.
1.1 Underpinning Technologies
The Semantic Web is a family of speci¯cations and pro-
posed technologies that are maturing in parallel to Web Ser-
vices. First coined by Tim Berners-Lee at the XML 2000
conference [5], the Semantic Web, as with Web Services, has
consistently increased in popularity. Interest and research
in the Semantic Web however remains primarily driven by
Copyright is held by the author/owner.
WWW 2006, May 23–26, 2006, Edinburgh, Scotland.
ACM 1595933329/
06/0005.
the academic community.
The Web Ontology Language (OWL) [9] is a World Wide
Web Consortium (W3C) standard for de¯ning semantically
rich languages. OWL Description Logic (OWL-DL) is a sub-
set of OWL which guarantees completeness and decidability.
The Semantic Web Rule Language (SWRL) [7] is a combi-
nation of the decidable subset of OWL and the Rule Markup
Language.
2. IMPLEMENTATION
It is necessary, for completion and testing of the above
mentioned hypothesis, to develop a full security architec-
ture. From research conducted into Web Service security
frameworks [10] [6] [8] the principal components of a Web
Service security architecture have been identi¯ed as encryp-
tion and decryption, signing and signature veri¯cation, key
management and access control.
2.1 Web Service Security
The security framework designed and implemented as part
of this research is built in Java using Apache Axis as the
SOAP implementation. The core encryption and decryption
engine is developed using Apache's Web Service Security for
Java (WSS4J) implementation of the WS-Security speci¯-
cation from OASIS. It adheres to the W3C speci¯cation for
XML-Encryption. The signing and signature veri¯cation en-
gine is also developed using WSS4J and adheres to the W3C
speci¯cation for XML-Signature. The key management is
built according to the XML Key Management Speci¯cation
(XKMS).
2.2 Semantically Defined Knowledge Base
The knowledge base which will be used in the authori-
sation process will be de¯ned in OWL. This will be a de-
scription of the information being protected. The decidable
subset of OWL, OWL-DL, will be used to represent the in-
formation in the system. All information does not have to
be de¯ned. This information base must contain at least a
description of Web Service endpoints along with the the de-
scription of all the information at the level at which the
user wants authorisation decisions to be made. This will be
discussed more in Section 2.5.
2.3 Semantically Defined Rules
The rules used to de¯ne the access rights of individuals to
the information represented in the knowledge base are writ-
913
ten in a semantically aware language. SWRL was chosen
as the rule language in our system. The main advantage
of using SWRL is its ability to provide support for com-
plex relationships between properties, therefore extending
the expressiveness of what we can de¯ne in OWL-DL. The
subjects of the rules will be de¯ned in the knowledge base,
as described in Section 2.2. Rules may be written to protect
access to two speci¯c resources; the web service endpoints
and the information they return. Return values from a Web
Service call will usually di®er, depending on the parameter
list of each call.
2.4 Evaluating Rules
Since both the knowledge base and the authorisation rules
are essentially written in OWL-DL, we can use an OWL-DL
reasoning engine to evaluate the rules. The main advan-
tage of SWRL, which was discussed in Section 2.3, can also
present a new problem domain since it extends the expres-
siveness of OWL-DL beyond the decidable subset of OWL.
There are two ways in which this can be overcome. Either
restrict the expressiveness of SWRL and use an existing rea-
soning engine such as Pellet or Racer, or use a reasoner such
as Hoolet which has been extended to handle SWRL rules.
We have chosen to use the extended reasoner Hoolet. To
ensure a decidable result from our authorisation we will re-
strict how the user may write these rules rather than re-
stricting the language itself.
2.5 Document Filtering
Authorisation decisions will ¯rstly be made with respect
to a Web Service endpoint. This can result in one of three
results:
² Requester is granted full access
² Requester is refused any access
² Requester is granted limited access
A requester being granted limited access implies that they
can access the endpoint but they will potentially be returned
sensitive information that they do not have access to. When
this happens, the response associated with the initial request
is examined and the information being returned must be
legally accessible by the requester. Any information which
is de¯ned as illegal for the requester will be pruned before
the response is sent.
The level of pruning is de¯ned by the user who is re-
sponsible for the update of the rules and knowledge stores.
Information may only be pruned if it is de¯ned in the knowl-
edge base. For example, assume the information structure
in Figure 1 exists in the system. If the user wants to spec-
ify that certain clients may not access Test Results then it
must be de¯ned in the knowledge base. Anyone with read
access to Clinical Information will have read access to all of
its unde¯ned children.
3. CONCLUSIONS
There is some similar research being carried out. We have
identi¯ed four projects that share some similarities to ours.
Rei is a distributed policy language that enables every
Web entity to specify policies for its access [1].
Parsia et al, in [4], propose a semantically-aware policy
language by translating WS-Policy into OWL-DL.
Figure 1: Sample Information Structure
Qin et al propose \an access control model for the Se-
mantic Web that is capable of specifying authorisations over
concepts de¯ned in ontologies and enforcing them upon data
instances annotated by the concepts" [2].
Damiani et al [3] outline how \current standard policy
languages such as XACML can be extended" to be able to
semantically de¯ne access control policies for the Semantic
Web.
The model proposed in this abstract di®ers from each of
these o®erings. The ¯rst two items deal with policies for
Web Services, often confused with authorisation rules. A
policy is the information which the owner of the service
wishes to share with potential business partners. The ¯nal
two areas of research are more similar to this paper, although
the research by Qin et al does not lend itself speci¯cally to
access control for Web Services and the work of Damiani et
al enriches XACML with RDF, RDF will not provide the
same semantic richness as OWL.
4. ACKNOWLEDGMENTS
This work is funded by Enterprise Ireland as part of the
Advanced Technology Research Program.
5. REFERENCES
[1] L. Kagal, T. Finin and A. Joshi. A Policy Based Approach to
Security for the Semantic Web. 2nd International Semantic
Web Conference, Sanibel Islands, Florida, USA, 2003.
[2] L. Qin and V. Atluri. Concept-Level Access Control for the
Semantic Web. ACM Workshop on XML Security, Fairfax,
VA, USA, 2003.
[3] E. Damiani, S. De Capatani di Vimercati, C. Fugazza and P.
Samarati. Extending Policy Languages to the Semantic Web.
4th International Conference on Web Engineering, Munich,
Germany, 2004.
[4] B. Parsia, V. Kolozski and J. Hendler. Expressing WS Policies
in OWL. 14th International World Wide Web Conference,
Chiba, Japan, 2005.
[5] T. Berners-Lee. Keynote address at XML 2000.
http://www.w3.org/2000/Talks/1206-xml2k-tbl/slide10-
0.html,
2000.
[6] B. Hartman, D. J. Flinn, K. Beznosov, and S. Kawamoto.
Mastering Web Service Security. Wiley, 2003.
[7] I. Horrocks and et al. SWRL: A Semantic Web Rule
Language combining OWL and RuleML, May 2004. URL:
http://www.daml.org/2003/11/swrl/".
[8] P. Kumar. J2EE Security For Servlets, EJBs and Web
Services. Prentice Hall, 2004.
[9] D. L. McGuinness and F. van Harmelen. OWL Web Ontology
Language, February 2004. URL:
http://www.w3.org/TR/owl-features/.
[10] M. O'Neill. Web Services Security. McGraw-Hill/Osborne,
2003.
914


--  作者:northenstar
--  发布时间:1/14/2007 10:21:00 AM

--  
楼主,您好, 首先感谢你发的一些文章,对我的帮助不少;我最近在选择课题方向,想了解语义web服务安全相关的方面能不能进展下去,希望你能给我一些建议,同时有比较好的相关材料在给我一些^_^,十分的感谢哦
--  作者:northenstar
--  发布时间:1/14/2007 10:24:00 AM

--  
^_^,我的邮箱是fan108@163.com,Thank you very much!^_^
W 3 C h i n a ( since 2003 ) 旗 下 站 点
苏ICP备05006046号《全国人大常委会关于维护互联网安全的决定》《计算机信息网络国际联网安全保护管理办法》
70.313ms