Advertisement

Semantic Matching of WS-SecurityPolicy Assertions

  • Monia Ben Brahim
  • Tarak Chaari
  • Maher Ben Jemaa
  • Mohamed Jmaiel
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7221)

Abstract

The lack of semantics in WS-SecurityPolicy (WS-SP) hampers the effectiveness of matching the compatibility between WS-SP assertions. To resolve this problem, we present in this paper a semantic approach for specifying and matching the security assertions. The approach consists in the transformation of WS-SP into an OWL-DL ontology and the definition of a set of semantic relations that can exist between the provider and requestor security concepts. We show how these relations lead to more correct and flexible matching of security assertions.

Keywords

Semantic Relation Security Policy Semantic Rule Semantic Match Algorithm Suite 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    OASIS: WS-Security 1.1, http://www.oasis-open.org/specs/
  2. 2.
    OASIS: WS-SecurityPolicy 1.3, http://www.oasis-open.org/specs/
  3. 3.
  4. 4.
    W3C: SWRL: A Semantic Web Rule Language Combining OWL and RuleML, http://www.w3.org/Submission/SWRL/
  5. 5.
    OASIS: Web Services Security X.509 Certificate Token Profile, http://www.oasis-open.org/specs/
  6. 6.
    W3C: OWL Web Ontology Language Guide, http://www.w3.org/TR/owl-guide/
  7. 7.
  8. 8.
    The Jess engine Web page, http://www.jessrules.com/
  9. 9.
    W3C: Semantic Annotations for WSDL and XML Schema, http://www.w3.org/TR/sawsdl/
  10. 10.
    Ben Brahim, M., Ben Jemaa, M., Jmaiel, M.: Security Mapping to Enhance Matching Fine-Grained Security Policies. In: Zavoral, F., Yaghob, J., Pichappan, P., El-Qawasmeh, E. (eds.) NDT 2010, Part I. CCIS, vol. 87, pp. 183–196. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  11. 11.
    Chaari, S., Badr, Y., Biennier, F.: Enhancing web service selection by qos-based ontology and ws-policy. In: Proceedings of the 2008 ACM Symposium on Applied Computing, pp. 2426–2431. ACM (2008)Google Scholar
  12. 12.
    Denker, G., Kagal, L., Finin, T.W., Paolucci, M., Sycara, K.: Security for DAML Web Services: Annotation and Matchmaking. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 335–350. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  13. 13.
    He, Z., Wu, L., Hong, Z., Lai, H.: Semantic security policy for web service. In: Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, pp. 258–262. IEEE Computer Society (2009)Google Scholar
  14. 14.
    Kim, A., Luo, J., Kang, M.: Security Ontology for Annotating Resources. In: Meersman, R., Tari, Z. (eds.) OTM 2005, Part II. LNCS, vol. 3761, pp. 1483–1499. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  15. 15.
    Kolovski, V., Parsia, B., Katz, Y., Hendler, J.: Representing Web Service Policies in OWL-DL. In: Gil, Y., Motta, E., Benjamins, V.R., Musen, M.A. (eds.) ISWC 2005. LNCS, vol. 3729, pp. 461–475. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  16. 16.
    Ono, K., Nakamura, Y., Satoh, F., Tateishi, T.: Verifying the consistency of security policies by abstracting into security types. In: Proceedings of the 2007 IEEE International Conference on Web Services, pp. 497–504. IEEE Computer Society (2007)Google Scholar
  17. 17.
    Speiser, S.: Semantic annotations for ws-policy. In: Proceedings of the 2010 IEEE International Conference on Web Services, pp. 449–456. IEEE Computer Society (2010)Google Scholar
  18. 18.
    Verma, K., Akkiraju, R., Goodwin, R.: Semantic matching of web service policies. In: Proceedings of the Second Workshop on Semantic and Dynamic Web Processes, pp. 79–90 (2005)Google Scholar
  19. 19.
    Zuquim Guimaraes Garcia, D., Beatriz Felgar de Toledo, M.: Ontology-based security policies for supporting the management of web service business processes. In: Proceedings of the 2th IEEE International Conference on Semantic Computing, pp. 331–338. IEEE Computer Society (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Monia Ben Brahim
    • 1
  • Tarak Chaari
    • 1
  • Maher Ben Jemaa
    • 1
  • Mohamed Jmaiel
    • 1
  1. 1.ReDCAD LaboratoryUniversity of Sfax, National School of Engineers of SfaxSfaxTunisia

Personalised recommendations