During interactions between organizations in the field of service-oriented architecture, some security requirements may change and new security policies addressed. Security requirements and capabilities of Web services are defined as security policies. The purpose of this paper is reconciliation of dynamic security policies and to explore the possibility of requirements of the new defined security policies.
During the process of applying the defined dynamic policy, is checked whether the service provider can accept the new policy or not. Therefore, the compatibility between existing policies and new defined policies are checked, and because the available algorithms for sharing between the two policies, resulted in duplication and contradictory assertion, in this paper for providing a compromise between the provided policy and the new policy, the fuzzy inference method mamdany is used . and by comparing the security level of proposed policy with the specified functionality, the negotiating procedure is done . The difference between the work done in this paper and previous works is in fuzzy calculation and conclusion for
negotiations. the advantages of thi work is that policies are defined dynamically and applied to bpel , also can be changed independently of bpel file.
%0 Journal Article
%1 noauthororeditor
%A Bayat, Fereshteh
%A Salajegheh, Afshin
%A Rastegari, Yousef
%D 2014
%J International Journal on Web Service Computing (IJWSC)
%K Attachment Negotiation Policy
%N 4
%P 01-07
%R 10.5121/ijwsc.2014.5401
%T NEGOTIATION ON A NEW POLICY IN SERVICE
%U http://airccse.org/journal/jwsc/papers/5414ijwsc01.pdf
%V 5
%X During interactions between organizations in the field of service-oriented architecture, some security requirements may change and new security policies addressed. Security requirements and capabilities of Web services are defined as security policies. The purpose of this paper is reconciliation of dynamic security policies and to explore the possibility of requirements of the new defined security policies.
During the process of applying the defined dynamic policy, is checked whether the service provider can accept the new policy or not. Therefore, the compatibility between existing policies and new defined policies are checked, and because the available algorithms for sharing between the two policies, resulted in duplication and contradictory assertion, in this paper for providing a compromise between the provided policy and the new policy, the fuzzy inference method mamdany is used . and by comparing the security level of proposed policy with the specified functionality, the negotiating procedure is done . The difference between the work done in this paper and previous works is in fuzzy calculation and conclusion for
negotiations. the advantages of thi work is that policies are defined dynamically and applied to bpel , also can be changed independently of bpel file.
@article{noauthororeditor,
abstract = {During interactions between organizations in the field of service-oriented architecture, some security requirements may change and new security policies addressed. Security requirements and capabilities of Web services are defined as security policies. The purpose of this paper is reconciliation of dynamic security policies and to explore the possibility of requirements of the new defined security policies.
During the process of applying the defined dynamic policy, is checked whether the service provider can accept the new policy or not. Therefore, the compatibility between existing policies and new defined policies are checked, and because the available algorithms for sharing between the two policies, resulted in duplication and contradictory assertion, in this paper for providing a compromise between the provided policy and the new policy, the fuzzy inference method mamdany is used . and by comparing the security level of proposed policy with the specified functionality, the negotiating procedure is done . The difference between the work done in this paper and previous works is in fuzzy calculation and conclusion for
negotiations. the advantages of thi work is that policies are defined dynamically and applied to bpel , also can be changed independently of bpel file.},
added-at = {2020-02-20T10:25:20.000+0100},
author = {Bayat, Fereshteh and Salajegheh, Afshin and Rastegari, Yousef},
biburl = {https://www.bibsonomy.org/bibtex/28d2cb7309bd785482f849470a273d363/ijwsc},
doi = {10.5121/ijwsc.2014.5401},
interhash = {fd7857fc5642fc937713a84516273960},
intrahash = {8d2cb7309bd785482f849470a273d363},
issn = {0976 - 9811 (Online); 2230 - 7702 (print)},
journal = {International Journal on Web Service Computing (IJWSC)},
keywords = {Attachment Negotiation Policy},
language = {English},
month = {December},
number = 4,
pages = {01-07},
timestamp = {2020-02-20T10:25:20.000+0100},
title = {NEGOTIATION ON A NEW POLICY IN SERVICE},
url = {http://airccse.org/journal/jwsc/papers/5414ijwsc01.pdf},
volume = 5,
year = 2014
}