Service Specification by Composition of Collaborations--An Example
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
Aligning UML 2.0 state machines and temporal logic for the efficient execution of services
ODBASE'06/OTM'06 Proceedings of the 2006 Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, DOA, GADA, and ODBASE - Volume Part II
Hi-index | 0.00 |
Securing availability of applications and services is increasingly important for provisioning services in today's and future networks and systems. For fulfilling user expectations, availability depends more and more on the characteristics and requirements of the services themselves and the different requirements of certain users. In order to address service availability, we see availability as a composite notion consisting of the ability to ensure access for authorized users only, and the property of being on hand and useable when needed. Service composition is an approach to incremental service development contributing to rapid service design and development. This paper presents a set of authentication and authorization patterns addressing the aspect of ensuring access to authorized users only in service composition. We provide a framework and classification of these patterns, and we demonstrate how the patterns can be composed with services using a policy-driven approach.