Proceedings of the 8th European software engineering conference held jointly with 9th ACM SIGSOFT international symposium on Foundations of software engineering
Interface Theories for Component-Based Design
EMSOFT '01 Proceedings of the First International Workshop on Embedded Software
Translating Privacy Practices into Privacy Promises—How to Promise What You Can Keep
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
Privacy Policy Compliance for Web Services
ICWS '04 Proceedings of the IEEE International Conference on Web Services
Conflict and combination in privacy policy languages
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Purpose based access control of complex data for privacy protection
Proceedings of the tenth ACM symposium on Access control models and technologies
Challenges to Reusable Services
SCC '05 Proceedings of the 2005 IEEE International Conference on Services Computing - Volume 02
Access control enforcement for conversation-based web services
Proceedings of the 15th international conference on World Wide Web
Bridging Trust Relationships with Web Service Enhancements
ICWS '06 Proceedings of the IEEE International Conference on Web Services
A Framework for Building Privacy-Conscious Composite Web Services
ICWS '06 Proceedings of the IEEE International Conference on Web Services
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Addressing privacy requirements in system design: the PriS method
Requirements Engineering
Privacy on the Web: Facts, Challenges, and Solutions
IEEE Security and Privacy
Towards the development of privacy-aware systems
Information and Software Technology
Formal consistency verification between BPEL process and privacy policy
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
IEEE Transactions on Software Engineering
Role-based consistency verification for privacy-aware Web services
CTS '09 Proceedings of the 2009 International Symposium on Collaborative Technologies and Systems
Modeling Cost-Aware Web Services Composition Using PTCCS
ICWS '09 Proceedings of the 2009 IEEE International Conference on Web Services
Conceptual modeling of privacy-aware web service protocols
CAiSE'07 Proceedings of the 19th international conference on Advanced information systems engineering
Role-based collaboration and its kernel mechanisms
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Supporting Software Development With Roles
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Toward a Service-Oriented Development Through a Case Study
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Hi-index | 0.00 |
With the popularity of Internet technology, web services are becoming the most promising paradigm for distributed computing. This increased use of web services has meant that more and more personal information of consumers is being shared with web service providers, leading to the need to guarantee that the private data of consumers are not illegitimate collected, used and disclosed in services collaboration. This paper studies how to realize the minimal privacy authorization while achieving the functional goals. Initially, this paper uses authorization policies to specify the privacy privileges of the services collaboration, and utilizes the trust relationships among services to make authorization decision. Next, it models the interface behaviors of services by extending the interface automata to support privacy semantics. Furthermore, it quantitatively analyzes the minimum set of privacy privileges which are required by the services to achieve the functional goals, and presents the minimal authorization algorithm, which helps us to automatically derive optimal authorization policies for a services collaboration. Finally, it verifies the correctness and efficiency of the approach proposed by this paper through a case study.