A technical architecture for enforcing usage control requirements in service-oriented architectures

  • Authors:
  • Agreiter Berthold;Muhammad Alam;Ruth Breu;Michael Hafner;Alexander Pretschner;Jean-Pierre Seifert;Xinwen Zhang

  • Affiliations:
  • University of Innsbruck, Innsbruck, Austria;University of Innsbruck, Innsbruck, Austria;University of Innsbruck, Innsbruck, Austria;University of Innsbruck, Innsbruck, Austria;ETH Zurich, Zurich, Switzerland;University of Innsbruck, Austria, and Samsung Information Systems America, San Jose, CA;Samsung Information Systems America, San Jose, CA

  • Venue:
  • Proceedings of the 2007 ACM workshop on Secure web services
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present an approach to modeling and enforcing usage control requirements on remote clients in service-oriented architectures. Technically, this is done by leveraging a trusted software stack relying on a hardware-based root of trust and a trusted Java virtual machine to create a measurable and hence trust worthy client-side application environment. We define a model-driven approach to specifying remote policies that makes the technical intricacies of the target platform transparent to the policy modeler.