Title | ||
---|---|---|
A technical architecture for enforcing usage control requirements in service-oriented architectures |
Abstract | ||
---|---|---|
We present an approach to modeling and enforcing usage control requirements on remote clients in service-oriented architectures. Technically, this is done by leveraging a trusted software stack relying on a hardware-based root of trust and a trusted Java virtual machine to create a measurable and hence trust worthy client-side application environment. We define a model-driven approach to specifying remote policies that makes the technical intricacies of the target platform transparent to the policy modeler. |
Year | DOI | Venue |
---|---|---|
2007 | 10.1145/1314418.1314422 | SWS |
Keywords | Field | DocType |
trusted computing,service oriented architecture,policies,soa,access control | Trusted Network Connect,Architecture,Trusted Computing,Computer science,Software,Access control,Service-oriented architecture,Database,Distributed computing,Java virtual machine | Conference |
Citations | PageRank | References |
7 | 0.54 | 13 |
Authors | ||
7 |
Name | Order | Citations | PageRank |
---|---|---|---|
Berthold Agreiter | 1 | 111 | 7.55 |
M.A. Alam | 2 | 227 | 17.84 |
Ruth Breu | 3 | 843 | 89.52 |
Michael Hafner | 4 | 145 | 11.46 |
Alexander Pretschner | 5 | 1585 | 137.50 |
Jean-Pierre Seifert | 6 | 1946 | 160.31 |
Zhang Xinwen | 7 | 1695 | 104.61 |