Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2014, Article ID 610278, 14 pages
http://dx.doi.org/10.1155/2014/610278
Research Article

Policy Decomposition for Evaluation Performance Improvement of PDP

1School of Computer Science and Technology, Xidian University, Xi’an 710071, China
2School of Software, Xidian University, Xi’an 710071, China

Received 30 December 2013; Accepted 10 April 2014; Published 7 May 2014

Academic Editor: Manyu Xiao

Copyright © 2014 Fan Deng et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. Bell, SOA Modeling Patterns for Service-Oriented Discovery and Analysis, John Wiley & Sons, Hoboken, NJ, USA, 2010.
  2. F. Hojaji and M. R. A. Shirazi, “Developing a more comprehensive and expressive SOA governance framework,” in Proceedings of the 2nd IEEE International Conference on Information Management and Engineering (ICIME '10), pp. 563–567, Chengdu, China, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  3. Y. C. Zhou, X. P. Liu, X. N. Wang, L. Xue, C. Tian, and X. X. Liang, “Context model based SOA policy framework,” in Proceedings of the IEEE 8th International Conference on Web Services (ICWS '10), pp. 608–615, Miami, Fla, USA, July 2010. View at Publisher · View at Google Scholar · View at Scopus
  4. Y. I. Nurhasan, B. Dabarsyah, and H. Fakhrurroja, “Information model design as model-driven for Service Oriented Architecture (SOA) implementation in PK-BLU institution using SOA Ontology: case study: financial administration bureau Padjadjaran University,” in Proceedings of the International Conference on ICT for Smart Society (ICISS '13), pp. 1–9, Jakarta, Indonesia, 2013.
  5. F. Hojaji and M. R. A. Shirazi, “A comprehensive SOA governance framework based on COBIT,” in Proceedings of the 6th World Congress on Services (Services-1 '10), pp. 407–414, Miami, Fla, USA, July 2010. View at Publisher · View at Google Scholar · View at Scopus
  6. N. Dan, S. H. Ji, C. Yuan, and G. J. Hu, “Attribute based access control (ABAC)-based cross-domain access control in service-oriented architecture (SOA),” in Proceedings of the International Conference on Computer Science & Service System (CSSS '12), pp. 1405–1408, Nanjing, China, 2012.
  7. W. She, I.-L. Yen, F. Bastani, B. Tran, and B. Thuraisingham, “Role-based integrated access control and data provenance for SOA based net-centric systems,” in Proceedings of the 6th IEEE International Symposium on Service-Oriented System Engineering (SOSE '11), pp. 225–234, Irvine, Calif, USA, December 2011. View at Publisher · View at Google Scholar · View at Scopus
  8. M. Jung, T. Hofer, S. Dobelt, G. Kienesberger, F. Judex, and W. Kastner, “Access control for a Smart Grid SOA Internet,” in Proceedings of the International Conferece for Technology and Secured Transactions, pp. 281–287, London, UK, 2012.
  9. G. H. Hwang, C. W. Lee, and Z. X. Jiang, “Workflow-based dynamic access control in a service-oriented architecture,” in Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA '12), pp. 47–52, Fukuoka, Japan, 2012.
  10. M. Kassou and L. Kjiri, “A maturity metric based approach for eliciting SOA security requirements,” in Proceedings of the National Days of Network Security and Systems (JNS '12), pp. 7–11, Marrakech, Morocco, 2012.
  11. E. Sonchaiwanich, J. Zhao, C. Dowin, and M. McRoberts, “Using AOP to separate SOA security concerns from application implementation,” in Proceedings of the IEEE Military Communications Conference (MILCOM '10), pp. 470–474, San Jose, Calif, USA, November 2010. View at Publisher · View at Google Scholar · View at Scopus
  12. N. Kabbani, S. Tilley, and L. Pearson, “Towards an evaluation framework for SOA security testing tools,” in Proceedings of the 4th International Systems Conference, pp. 438–443, San Diego, Calif, USA, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  13. N. Shahgholi, M. Mohsenzadeh, M. A. Seyyedi, and S. H. Qorani, “A new SOA security framework defending web services against WSDL attacks,” in Proceedings of the 3rd IEEE International Conference on Social Computing (socialcom '11), pp. 1259–1262, Boston, Mass, USA, October 2011. View at Publisher · View at Google Scholar · View at Scopus
  14. N. Ahmed, R. Gamble, M. Linderman, and B. Bhargava, “Analysis of End-to-End SOA Security Protocols with Mobile Devices,” in Proceedings of the 14th IEEE International Conference on Mobile Data Management (MDM '13), pp. 166–170, Milan, Italy, 2013.
  15. N. Kabbani and S. Tilley, “Evaluating the capabilities of SOA security testing tools,” in Proceedings of the 5th IEEE International Systems Conference (SysCon '11), pp. 129–134, Montreal, Canada, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  16. Z. Liu, L. Gu, Y. Yang, and G. Xing, “An identity authentication scheme based on USB key for trusted network connect,” in Proceedings of the IEEE International Conference on Information Theory and Information Security (ICITIS '10), pp. 203–207, Beijing, China, December 2010. View at Publisher · View at Google Scholar · View at Scopus
  17. Y. N. Sun, X. H. Guan, T. Liu, and Y. Qu, “An identity authentication mechanism based on timing covert channel,” in Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom '12), pp. 832–836, Liverpool, UK, 2012.
  18. B. Li, “On identity authentication technology of distance education system based on voiceprint recognition,” in Proceedings of the 30th Chinese Control Conference (CCC '11), pp. 5718–5721, Yantai, China, July 2011. View at Scopus
  19. K. Peng, J. Zheng, and J. Yang, “An identity authentication system based on mobile phone token,” in Proceedings of the IEEE International Conference on Network Infrastructure and Digital Content, pp. 570–575, Beijing, China, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  20. Y. G. Yang, H. Y. Wang, X. Jia, and H. Zhang, “A quantum protocol for (t, n)-threshold identity authentication based on greenberger-horne-zeilinger states,” International Journal of Theoretical Physics, vol. 52, no. 2, pp. 524–530, 2013. View at Google Scholar
  21. N. C. N. Chu and K. E. Barker, “Dynamic Role Lease Authorization for a Grid/Cloud,” in Proceedings of the 10th International Conference on ICT and Knowledge Engineering, pp. 63–70, Bangkok, Thailand, 2012.
  22. C. Liu and L. Z. Liu, “A trust evaluation model for dynamic authorization,” in Proceedings of the International Conference on Computational Intelligence and Software Engineering (CiSE '10), pp. 1–4, Wuhan, China, December 2010. View at Publisher · View at Google Scholar · View at Scopus
  23. H. Xie, B. Zhang, and D. Y. Hu, “A role-based dynamic authorization model and its implementation in PMI,” in Proceedings of the International Conference on Computer Science and Software Engineering (CSSE '08), pp. 661–664, Wuhan, China, December 2008. View at Scopus
  24. D. Tang, J. Guo, and Q. Zhang, “A dynamic workflow authorization method based on participant expression rules,” in Proceedings of the IEEE International Conference on Computer Science and Automation Engineering (CSAE '11), pp. 345–349, Shanghai, China, June 2011. View at Publisher · View at Google Scholar · View at Scopus
  25. J. J. Wang, J. P. Li, Y. F. Li, and J. Peng, “Review of key-based dynamic trust authorization mechanism,” in Proceedings of the International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP '12), pp. 263–267, Chengdu, China, 2012.
  26. M. Xu, D. Wijesekera, and X. Zhang, “Runtime administration of an RBAC profile for XACML,” IEEE Transactions on Services Computing, vol. 4, no. 4, pp. 286–299, 2011. View at Publisher · View at Google Scholar · View at Scopus
  27. A. Mourad, H. Otrok, H. Yahyaoui, and L. Baajour, “Toward an abstract language on top of XACML for web services security,” in Proceedings of the International Conference for Internet Technology and Secured Transactions (ICITST '11), pp. 254–259, Abu Dhabi, United Arab Emirates, December 2011. View at Scopus
  28. C. Ran and G. Guo, “Security XACML access control model based on SOAP encapsulate,” in Proceedings of the International Conference on Computer Science and Service System (CSSS '11), pp. 2543–2546, Nanjing, China, June 2011. View at Publisher · View at Google Scholar · View at Scopus
  29. D. E. Kateb, T. Mouelhi, Y. L. Traon, J. Y. Hwang, and T. Xie, “Refactoring access control policies for performance improvement,” in Proceedings of International Conference on Performance Engineering (ICPE '12), pp. 323–334, New York, NY, USA, 2012.
  30. A. Alzahrani, H. Janicke, and S. Abubaker, “Decentralized XACML overlay network,” in Proceedings of the 10th IEEE International Conference on Computer and Information Technology, pp. 1032–1037, Bradford, UK, July 2010. View at Publisher · View at Google Scholar · View at Scopus
  31. M. Decat, B. Lagaisse, and W. Joosen, “Toward efficient and confidentiality-aware federation of access control policies,” in Proceedings of the 7th Workshop on Middleware for Next Generation Internet Computing (MW4NG '12), New York, NY, USA, 2012.
  32. R. Craven, J. Lobo, E. Lupu, A. Russo, and M. Sloman, “Policy refinement: decomposition and operationalization for dynamic domains,” in Proceedings of the 7th International Conference on Network and Service Management (CNSM '11), pp. 115–123, Laxenburg, Austria, October 2011. View at Scopus
  33. A. X. Liu, F. Chen, J. Y. Hwang, and T. Xie, “Designing fast and scalable XACML policy evaluation engines,” IEEE Transactions on Computers, vol. 60, no. 12, pp. 1802–1817, 2011. View at Google Scholar
  34. S. Marouf, M. Shehab, A. Squicciarini, and S. Sundareswaran, “Adaptive reordering and clustering-based framework for efficient XACML policy evaluation,” IEEE Transactions on Services Computing, vol. 4, no. 4, pp. 300–313, 2011. View at Publisher · View at Google Scholar · View at Scopus
  35. Y. Z. Wang, D. G. Feng, L. W. Zhang, and M. Zhang, “XACML policy evaluation engine based on multi-level optimization technology,” Journal of Software, vol. 22, no. 2, pp. 323–338, 2011. View at Publisher · View at Google Scholar · View at Scopus
  36. Y. le Traon, T. Mouelhi, A. Pretschner, and B. Baudry, “Test-driven assessment of access control in legacy applications,” in Proceedings of the 1st International Conference on Software Testing, Verification and Validation (ICST '08), pp. 238–247, Lillehammer, Norway, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  37. T. Mouelhi, F. Fleurey, B. Baudry, and Y. le Traon, “A model-based framework for security policy specification, deployment and testing,” in Model Driven Engineering Languages and Systems, vol. 5301 of Lecture Notes in Computer Science, pp. 537–552, Springer, Berlin, Germany, 2008. View at Publisher · View at Google Scholar · View at Scopus
  38. T. Mouelhi, Y. L. Traon, and B. Baudry, “Transforming and selecting functional test cases for security policy testing,” in Proceedings of the 2nd International Conference on Software Testing, Verification, and Validation (ICST '09), pp. 171–180, Denver, Colo, USA, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  39. E. Martin and T. Xie, “Automated test generation for access control policies,” in Proceedings of the IEEE International Symposium on Software Reliability Engineering (ISSRE '06), pp. 752–753, New York, NY, USA, November 2006.
  40. A. Bertolino, S. Daoudagh, F. Lonetti, and E. Marchetti, “Automatic XACML requests generation for policy testing,” in Proceedings of the 5th IEEE International Conference on Software Testing, Verification and Validation, pp. 842–849, Montreal, Canada, 2012.