Loading...
Please wait, while we are loading the content...
Proceedings of the 2009 ACM workshop on Secure web services (SWS '09)
| Content Provider | ACM Digital Library |
|---|---|
| Editor | Proctor, Seth Damiani, Ernesto Singal, Anoop |
| Copyright Year | 2009 |
| Abstract | As business-process automation started to take hold in the early 1990s, companies have progressively automated their internal workflows. However, human intervention was still considered essential for critical tasks such as money transfers and purchase order, where appropriate protection to sensitive information was of paramount importance. In the last decade, service orientation has radically changed this situation. On today's Service-Oriented Architectures (SOA), no strict division of labor should or can exist between the tasks for which software services are responsible and those delegated to human operators. Necessary as it was, this integration has introduced a number of security weaknesses; in inter-organizational distributed environments, software services and process engines can be even more vulnerable than their predecessors mainframes and leased line transfers. Indeed, careless adoption of inter-organizational SOA-based processes can expose organizations to a considerable amount of security risk and dependability degradation. The security research community has been working on this issue since the early days of SOAs: in the last few years, basic security protocols for Web Services, such as XML Security, the WS-* series of proposals, SAML, and XACML have been proposed to enable Web Services and the nodes of GRID architectures to interoperate securely. As long-time organizers of the ACM Secure Web Services Workshop, and as contributors to the initial core of technologies for Web service security like XACML, we have witnessed the rapid evolution of service security research since its early days. Today, the basic building blocks of SOA security are firmly in place, but a number of challenges - including bulk encryption, end to end dependability, and efficient policy evaluation - are still to be met for Web services and GRID architectures to become fully secured and trusted. Also, the current trend toward designing and implementing business processes by means of Web services orchestration is fostering an evolutionary step of security and dependability models and languages, whose key issues include (i) dealing with inter-organizational security issues, (ii) representing and enforcing high level business process policies and policy regulations in a SOA environment, (iii) defining a consistent notion of trust among services and setting up a trusted infrastructure for service-oriented computing. The 2009 edition of the Secure Web Services Workshop explores recent solutions to these challenges, ranging from the advancement and best practices of basic technologies such as Web services security and dependability protocols to higher level issues such as business process security and dependability policies, trust establishment, end-to-end dependability, QoS balancing, risk management, and services assurance. This year's call of papers received 14 submissions, of which 7 were accepted. We believe they offer an excellent overview of recent research in the area. |
| ISBN | 9781605587899 |
| Language | English |
| Publisher | Association for Computing Machinery (ACM) |
| Publisher Date | 2009-11-13 |
| Access Restriction | Subscribed |
| Content Type | Text |
| Resource Type | Conference Proceedings |