SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal on Web Service Computing (IJWSC), Vol.5, No.4, December 2014
DOI : 10.5121/ijwsc.2014.5401 1
NEGOTIATION ON A NEW POLICY IN SERVICE
Fereshteh Bayat and Afshin Salajegheh and Yousef Rastegari
.
M.S. Graduate of Software Engineering,Azad University South Branch,tehran,Iran
Ph.D Assistant Professor of Software Engineering and Computer Science
IAU Tehran South Branch,Tehran,Iran
Ph.D. Candidate of Shahid Beheshti University, Electrical & Computer Engineering
Department, Tehran, Iran
ABSTRACT
During interactions between organizations in the field of service-oriented architecture, some security
requirements may change and new security policies addressed. Security requirements and capabilities of
Web services are defined as security policies. The purpose of this paper is reconciliation of dynamic
security policies and to explore the possibility of requirements of the new defined security policies.
During the process of applying the defined dynamic policy, is checked whether the service provider can
accept the new policy or not. Therefore, the compatibility between existing policies and new defined
policies are checked, and because the available algorithms for sharing between the two policies, resulted in
duplication and contradictory assertion, in this paper for providing a compromise between the provided
policy and the new policy, the fuzzy inference method mamdany is used . and by comparing the security
level of proposed policy with the specified functionality, the negotiating procedure is done . The difference
between the work done in this paper and previous works is in fuzzy calculation and conclusion for
negotiations. the advantages of thi work is that policies are defined dynamically and applied to bpel , also
can be changed independently of bpel file.
KEYWORDS
Policy,Policy Attachment,Negotiation
1. INTRODUCTION
In general, to determine which web service is appropriate for a specific application, functional
capabilities should be adapt able with functional requirements and also non-functional capabilities
in Web service should meet non-functional requirements. Consumer and provider of Web
services, define their requirements and security policies as XML files named ws-policy. WS-
policy provides a basic structure to describe a wide range of requirements and capabilities of Web
services. In this paper, the changes are security changes and while applying new policies to
processes , check whether the service provider will be accept the new policy or not.
In part 2, the structure of policies is defined. In part 3, the framework will be described and check
the ability to dynamically negotiate on new policy. If the negotiation success , the new policy
will be dynamically applied. The fuzzy tools of Matlab is used for implementation of proposed
method. Section four presents the conclusions and suggestions for future deals.
International Journal on Web Service Computing (IJWSC), Vol.5, No.4, December 2014
2
2. WS-POLICY STRUCTURE
WS-Policy (Web Service Policy) is used to describe the quality of service. WS- Policy, is a
general-purpose model for describing Web service policies, which including blocks to exchange
their policies. WS-Policy defines a policy as a set of alternative which each alternative is a set of
assertions. indeed assertions describe requirements and functionalities of the Web service.
The main structure of a policy in the normal form is as follows:
<wsp:Policy … >
<wsp:ExactlyOne>
( <wsp:All> ( <Assertion …> … </Assertion> )* </wsp:All> )*
</wsp:ExactlyOne>
</wsp:Policy>
Listing 1 : normal ws-policy structure
The following example represents the normal form of a policy:
(01) <wsp:Policy
xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy"
xmlns:wsp="http://schemas.xmlsoap.org/ws/2004/09/policy" >
(02) <wsp:ExactlyOne>
(03) <wsp:All>
(04) <sp:Basic256Rsa15 />
(05) </wsp:All>
(06) <wsp:All>
(07) <sp:TripleDesRsa15 />
(08) </wsp:All>
(09) </wsp:ExactlyOne>
(10) </wsp:Policy>
Listing 2 : ws-policy example
3. PROBLEM PLAN
In order to provide security during data exchange between the services, should service providers
and requester agree on their capabilities and requirements. The WS-Policy does not offer a
negotiated solution over the web service policies. During interactions between organizations,
some Web Service security requirements may be changed and the new security policy is defined.
In order to dynamically attach policies to bpel and negotiate on the proposed policy, outlined
framework in section 4 is provided.
4 . PROPOSED FRAMEWORK
To attach new policy to BPEL externally and negotiate on policies, outlined framework in Figure
1 is provided. The proposed policy is attached on the two input files and how to attach is
reflected. Before the change of policy attachment file, a lock is set on policy file to prevent
changes during policy attachment process. Then policies and activities that policies be attached to
are identified and a mapping between the scope's activities and the new corresponding policy is
created. In order to link a defined external policy with BPEL activities, WS-Policy Attachment
structure is used . Attached files are XML files containing “Applies to” element and, “selector”;
International Journal on Web Service Computing (IJWSC), Vol.5, No.4, December 2014
3
the child element. The selector is, an XPATH expression to select an activity within bpel scope. It
also contains another element called PolicyReference which includes a reference to a policy. For
example, the proposed policy by the name “ATM_new_Policy” . apply to “createTicket” activity
as follows:
Listing 3 : policy attachment
And content of the new policy of ATM_new_Policy are:
Listing 3 :
policy
Listing 3 :
policy
Listing 4 ATM_new_Policy
Figure 1 : proposed framework for new policy attachment and negotiation
<wsp:PolicyAttachment
xmlns:wsp=”http://schemas.xmlsoap.org/ws/policy/”
xmlns:bpel=”http://schemas.xmlsoap.org/ws/business−process/”>
<wsp:AppliesTo>
<bpat:selector>
//bpel:scope[@name=”TicketCreationUnit”]//bpel:invoke[@operation=”createTicket”]
</bpat:selector>
</wsp:AppliesTo>
<wsp:PolicyReference
URI=” http://schemas.xmlsoap.org/ws/securitypolicy./ATM_new_Policy”/>
</wsp:PolicyAttachment>
<wsp:Policy
Xmlns:wsu = “http://schemas.xmlsoap.org/ws/securitypolicy”
Wsu:Id=”ATM_new_Policy”>
<wsp:ExactlyOne>
<wsp:All>
<sp:AlgorithmSuite>
<sp:Basic256/>
</sp:AlgorithmSuite>
<sp: AuthenticationToken>
<sp:UsernameToken/>
</sp: AuthenticationToken >
</wsp:All>
</wsp:ExactlyOne>
</wsp:Policy>
International Journal on Web Service Computing (IJWSC), Vol.5, No.4, December 2014
4
Figure 1 : proposed framework for new policy attachment and negotiation
We will describe Figure 1 at below:
Analyze: when it turns to perform an bpel activity within the particular bpel scope, searching
begins in the mapping file,to determine whether new policy for proposed activitiy is defined or
not. If the policy is not defined, bpel engine is notified to continue its work. If the new policy is
defined, then it is surveyed that the proposed policy is new to attach to the activity or is already
applied.
Renegotiate: In this part, fuzzy calculations are done for all alternatives in the proposed policy.
If the security level for at least one alternative is supported by provider, negotiation will be done,
if not ,another supplier is reselect.
Fuzzy Unit: in order to negotiate for accepting the new policy, the degree of provided security
by the new policy is calculated according to the fuzzy calculations and then compared with
provider's capabilities.
Table 1 : Algorithm_Suite
Table 1 : Algorithm_Suite
Assigned_number
AlgorithmSuite
16Basic256
15Basic192
14Basic128
13TipleDes
12Basic256Rsa15
11Basic192Rsa15
10Basic128Rsa15
9TripleDesRsa15
8Basic256Sha256
International Journal on Web Service Computing (IJWSC), Vol.5, No.4, December 2014
5
7Basic192Sha256
6Basic128Sha256
5TripleDesSha256
4Basic256Sha256Rsa15
3Basic192Sha256Rsa15
2Basic128Sha256Rsa15
1TripleDesSha256Rsa15
0No-algorithm
Table 2 : AuthenticationToken
Assigned_numberAthenticationToken
9X509Token
8KerberosToken
7SamlToken
6RelToken
5SecureConversationToken
4SecurityContextToken
3SpnegoContextToken
2IssuedToken
1UsernameToken
0No-algorithm
Table 1 represents a sequence of algorithms and the sequence of tokens are described in Table 2.
Algorithm Suite and Authentication Token are assertion types of policy. The left column of table
1 is from the strongest to the weakest algorithm and the left column of table2 is from the strongest
to the weakest authentication token . For example TripleDesSha256Rsa15 and Username Token
are the weakest .[4] For each input variable Algorithm Suite, Authentication Token and security
output variable, fuzzy sets are defined in accordance with membership functions in Figures 2, 3
and 4.
Figure 2 : algorithmSuite membership function
Figure 3 : authenticationToken membership function
International Journal on Web Service Computing (IJWSC), Vol.5, No.4, December 2014
6
Figure 4 :security membership function
Based on fuzzy calculation steps and defined fuzzy rules, output fuzzy calculation, for the
proposed ATM_new_Policy would be accordance with Figure 5.
Figure 5 : Fuzzy Mamdani method output in Matlab
The final step is to calculate a value corresponding to the security level which is the center of
gravity for the aggregsted area in figure 5. In the example above, as can be seen in Figure 2
Calculated security level is equal to 60. In accordance to obtained number = 60, and the provider
capability for the security policy is defined between 60 and 70, then negotiation will be
performed. In fact, the fuzzy calculations for all new policy alternatives is done and if at least the
security level of one alternative is supported by provider, the negotiation will be done but if the
calculated security level of none of the alternatives is not included in the capability range of
provider, then another provider will be selected.
Enforce policy: After doing the above steps, bpel engine attachment file corresponding to input
attachment file will be modified and during the execution of the corresponding activity in bpel,
the proposed policy will apply. Input attachment will be unlocked to be accessible for future
changes.
5. CONCLUSIONS
WS-policy is used to specify the security features of web services .
In this paper a framework is proposed to attach a new policy to bpel activitiy dynamically and
negotiate between requester and provider . Among the advantages that can point for the proposed
framework , is that external attachment of policies to bpel distinct the business process logic from
describtion of quality of service . The policies and BPEL files can be changed independently of
each other. In addition, the policies can be changed at runtime. It also reduces the complexity of
BPEL processes,increase maintainability and changability of bpel processes.
International Journal on Web Service Computing (IJWSC), Vol.5, No.4, December 2014
7
REFERENCES
[1] S.Bajaj,D.Box,F.Chappell “Web Service Policy 1.2 - Framework (WS-Policy) , W3C Member
Submission 25 April 2006
[2] G.Della-Libera,M.Gudgin “Web Services Security Policy Language (WS-SecurityPolicy)”
,IBM,Microsoft,RSA,Verisign, July 2005
[3] A.Charfi,R.Khalaf,N.Mukhi “QOS-aware web service composition using non-intrusive policy
attachment to bpel”,Springer ,pp.582-593 , 2007
[4] T.Lavarack,M.Coetzee “Considering web services security policy compatibility” , IEEE Information
Security for South Africa (ISSA) , august 2010
[5] A.Strunk,S.Reichert,A.Schill “An Infrastructure for supporting Rebinding in BPEL Processes”,IEEE
Enterprise Distributed Object Computing Conference Workshops , pp.230-237,Sept.2009
[6] M.Negnevitsky “Artificial Intelligence: A Guide to Intelligent Systems” , Pearson Education , 2009

More Related Content

What's hot

Incentive compatible privacy preserving data
Incentive compatible privacy preserving dataIncentive compatible privacy preserving data
Incentive compatible privacy preserving dataIEEEFINALYEARPROJECTS
 
A statistical data fusion technique in virtual data integration environment
A statistical data fusion technique in virtual data integration environmentA statistical data fusion technique in virtual data integration environment
A statistical data fusion technique in virtual data integration environmentIJDKP
 
m-Privacy for Collaborative Data Publishing
m-Privacy for Collaborative Data Publishingm-Privacy for Collaborative Data Publishing
m-Privacy for Collaborative Data PublishingMigrant Systems
 
Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentPrivacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentJPINFOTECH JAYAPRAKASH
 
IRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine LearningIRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine LearningIRJET Journal
 
Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentPrivacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentJPINFOTECH JAYAPRAKASH
 
Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentPrivacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentIEEEFINALYEARPROJECTS
 

What's hot (7)

Incentive compatible privacy preserving data
Incentive compatible privacy preserving dataIncentive compatible privacy preserving data
Incentive compatible privacy preserving data
 
A statistical data fusion technique in virtual data integration environment
A statistical data fusion technique in virtual data integration environmentA statistical data fusion technique in virtual data integration environment
A statistical data fusion technique in virtual data integration environment
 
m-Privacy for Collaborative Data Publishing
m-Privacy for Collaborative Data Publishingm-Privacy for Collaborative Data Publishing
m-Privacy for Collaborative Data Publishing
 
Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentPrivacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignment
 
IRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine LearningIRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine Learning
 
Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentPrivacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignment
 
Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentPrivacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignment
 

Viewers also liked

Web Services Discovery and Recommendation Based on Information Extraction and...
Web Services Discovery and Recommendation Based on Information Extraction and...Web Services Discovery and Recommendation Based on Information Extraction and...
Web Services Discovery and Recommendation Based on Information Extraction and...ijwscjournal
 
Strategy controlling]
Strategy controlling]Strategy controlling]
Strategy controlling]Luong Huu
 
FUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGY
FUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGYFUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGY
FUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGYijwscjournal
 
SOA-A GENERIC APPROACH FOR INTEGRATING LOOSELY COUPLED SYSTEMS WITH OTHER SYS...
SOA-A GENERIC APPROACH FOR INTEGRATING LOOSELY COUPLED SYSTEMS WITH OTHER SYS...SOA-A GENERIC APPROACH FOR INTEGRATING LOOSELY COUPLED SYSTEMS WITH OTHER SYS...
SOA-A GENERIC APPROACH FOR INTEGRATING LOOSELY COUPLED SYSTEMS WITH OTHER SYS...ijwscjournal
 
Amazon e i social data
Amazon e i social dataAmazon e i social data
Amazon e i social dataDomenico Manna
 
Tap huan pm dky lich
Tap huan pm dky lichTap huan pm dky lich
Tap huan pm dky lichLuong Huu
 
Similarity measures for web service composition models
Similarity measures for web service composition modelsSimilarity measures for web service composition models
Similarity measures for web service composition modelsijwscjournal
 
Myanmar web pages crawler
Myanmar web pages crawlerMyanmar web pages crawler
Myanmar web pages crawlerijwscjournal
 
Speeding Up the Web Crawling Process on a Multi-Core Processor Using Virtuali...
Speeding Up the Web Crawling Process on a Multi-Core Processor Using Virtuali...Speeding Up the Web Crawling Process on a Multi-Core Processor Using Virtuali...
Speeding Up the Web Crawling Process on a Multi-Core Processor Using Virtuali...ijwscjournal
 
WEB SERVICE COMPOSITION PROCESSES: A COMPARATIVE STUDY
WEB SERVICE COMPOSITION PROCESSES: A COMPARATIVE STUDYWEB SERVICE COMPOSITION PROCESSES: A COMPARATIVE STUDY
WEB SERVICE COMPOSITION PROCESSES: A COMPARATIVE STUDYijwscjournal
 
Yahoo native ads
Yahoo native adsYahoo native ads
Yahoo native adsDomenico Manna
 
An exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p networkAn exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p networkijwscjournal
 
ADAPTIVE MODEL FOR WEB SERVICE RECOMMENDATION
ADAPTIVE MODEL FOR WEB SERVICE RECOMMENDATIONADAPTIVE MODEL FOR WEB SERVICE RECOMMENDATION
ADAPTIVE MODEL FOR WEB SERVICE RECOMMENDATIONijwscjournal
 
Com crear una botiga online
Com crear una botiga onlineCom crear una botiga online
Com crear una botiga onlinehoffal
 
AN ADAPTIVE APPROACH FOR DYNAMIC RECOVERY DECISIONS IN WEB SERVICE COMPOSITIO...
AN ADAPTIVE APPROACH FOR DYNAMIC RECOVERY DECISIONS IN WEB SERVICE COMPOSITIO...AN ADAPTIVE APPROACH FOR DYNAMIC RECOVERY DECISIONS IN WEB SERVICE COMPOSITIO...
AN ADAPTIVE APPROACH FOR DYNAMIC RECOVERY DECISIONS IN WEB SERVICE COMPOSITIO...ijwscjournal
 

Viewers also liked (19)

Web Services Discovery and Recommendation Based on Information Extraction and...
Web Services Discovery and Recommendation Based on Information Extraction and...Web Services Discovery and Recommendation Based on Information Extraction and...
Web Services Discovery and Recommendation Based on Information Extraction and...
 
Strategy controlling]
Strategy controlling]Strategy controlling]
Strategy controlling]
 
Haribo
HariboHaribo
Haribo
 
FUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGY
FUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGYFUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGY
FUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGY
 
SOA-A GENERIC APPROACH FOR INTEGRATING LOOSELY COUPLED SYSTEMS WITH OTHER SYS...
SOA-A GENERIC APPROACH FOR INTEGRATING LOOSELY COUPLED SYSTEMS WITH OTHER SYS...SOA-A GENERIC APPROACH FOR INTEGRATING LOOSELY COUPLED SYSTEMS WITH OTHER SYS...
SOA-A GENERIC APPROACH FOR INTEGRATING LOOSELY COUPLED SYSTEMS WITH OTHER SYS...
 
Amazon e i social data
Amazon e i social dataAmazon e i social data
Amazon e i social data
 
Finance
FinanceFinance
Finance
 
Tap huan pm dky lich
Tap huan pm dky lichTap huan pm dky lich
Tap huan pm dky lich
 
Similarity measures for web service composition models
Similarity measures for web service composition modelsSimilarity measures for web service composition models
Similarity measures for web service composition models
 
Myanmar web pages crawler
Myanmar web pages crawlerMyanmar web pages crawler
Myanmar web pages crawler
 
Speeding Up the Web Crawling Process on a Multi-Core Processor Using Virtuali...
Speeding Up the Web Crawling Process on a Multi-Core Processor Using Virtuali...Speeding Up the Web Crawling Process on a Multi-Core Processor Using Virtuali...
Speeding Up the Web Crawling Process on a Multi-Core Processor Using Virtuali...
 
WEB SERVICE COMPOSITION PROCESSES: A COMPARATIVE STUDY
WEB SERVICE COMPOSITION PROCESSES: A COMPARATIVE STUDYWEB SERVICE COMPOSITION PROCESSES: A COMPARATIVE STUDY
WEB SERVICE COMPOSITION PROCESSES: A COMPARATIVE STUDY
 
Amazon data
Amazon dataAmazon data
Amazon data
 
Yahoo native ads
Yahoo native adsYahoo native ads
Yahoo native ads
 
An exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p networkAn exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p network
 
Fast brands
Fast brandsFast brands
Fast brands
 
ADAPTIVE MODEL FOR WEB SERVICE RECOMMENDATION
ADAPTIVE MODEL FOR WEB SERVICE RECOMMENDATIONADAPTIVE MODEL FOR WEB SERVICE RECOMMENDATION
ADAPTIVE MODEL FOR WEB SERVICE RECOMMENDATION
 
Com crear una botiga online
Com crear una botiga onlineCom crear una botiga online
Com crear una botiga online
 
AN ADAPTIVE APPROACH FOR DYNAMIC RECOVERY DECISIONS IN WEB SERVICE COMPOSITIO...
AN ADAPTIVE APPROACH FOR DYNAMIC RECOVERY DECISIONS IN WEB SERVICE COMPOSITIO...AN ADAPTIVE APPROACH FOR DYNAMIC RECOVERY DECISIONS IN WEB SERVICE COMPOSITIO...
AN ADAPTIVE APPROACH FOR DYNAMIC RECOVERY DECISIONS IN WEB SERVICE COMPOSITIO...
 

Similar to NEGOTIATION ON A NEW POLICY IN SERVICE

ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATIONASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATIONijwscjournal
 
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATIONASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATIONijwscjournal
 
ADAPTIVE MODEL FOR WEB SERVICE RECOMMENDATION
ADAPTIVE MODEL FOR WEB SERVICE RECOMMENDATIONADAPTIVE MODEL FOR WEB SERVICE RECOMMENDATION
ADAPTIVE MODEL FOR WEB SERVICE RECOMMENDATIONijwscjournal
 
ADAPTIVE MODEL FOR WEB SERVICE RECOMMENDATION
ADAPTIVE MODEL FOR WEB SERVICE RECOMMENDATIONADAPTIVE MODEL FOR WEB SERVICE RECOMMENDATION
ADAPTIVE MODEL FOR WEB SERVICE RECOMMENDATIONijwscjournal
 
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...IRJET Journal
 
Evaluation of a Framework for Integrated Web Services
Evaluation of a Framework for Integrated Web ServicesEvaluation of a Framework for Integrated Web Services
Evaluation of a Framework for Integrated Web ServicesIRJET Journal
 
Gc3310851089
Gc3310851089Gc3310851089
Gc3310851089IJERA Editor
 
Gc3310851089
Gc3310851089Gc3310851089
Gc3310851089IJERA Editor
 
Collaborative policy administration
Collaborative policy administrationCollaborative policy administration
Collaborative policy administrationJPINFOTECH JAYAPRAKASH
 
A Formal Framework for SAAS Customization Based on Multi-Layered Architecture...
A Formal Framework for SAAS Customization Based on Multi-Layered Architecture...A Formal Framework for SAAS Customization Based on Multi-Layered Architecture...
A Formal Framework for SAAS Customization Based on Multi-Layered Architecture...CSCJournals
 
IRJET - Customer Churn Analysis in Telecom Industry
IRJET - Customer Churn Analysis in Telecom IndustryIRJET - Customer Churn Analysis in Telecom Industry
IRJET - Customer Churn Analysis in Telecom IndustryIRJET Journal
 
Collaborative policy administration
Collaborative policy administrationCollaborative policy administration
Collaborative policy administrationshanofa sanu
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com msudan92
 
WS-PolicyAttachment: Message Content Filters 1.1
WS-PolicyAttachment: Message Content Filters 1.1WS-PolicyAttachment: Message Content Filters 1.1
WS-PolicyAttachment: Message Content Filters 1.1Sarah Duffy
 
8367 collaborative policy-administration-pdf
8367 collaborative policy-administration-pdf8367 collaborative policy-administration-pdf
8367 collaborative policy-administration-pdfChinnu SD
 
DDS-TSN OMG Request for Proposals (RFP)
DDS-TSN OMG Request for Proposals (RFP)DDS-TSN OMG Request for Proposals (RFP)
DDS-TSN OMG Request for Proposals (RFP)Gerardo Pardo-Castellote
 
Automatic Management of Wireless Sensor Networks through Cloud Computing
Automatic Management of Wireless Sensor Networks through Cloud ComputingAutomatic Management of Wireless Sensor Networks through Cloud Computing
Automatic Management of Wireless Sensor Networks through Cloud Computingyousef emami
 
How to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHow to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHanaysha
 
Time-Ordered Collaborative Filtering for News Recommendation
Time-Ordered Collaborative Filtering for News RecommendationTime-Ordered Collaborative Filtering for News Recommendation
Time-Ordered Collaborative Filtering for News RecommendationIRJET Journal
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES ijwscjournal
 

Similar to NEGOTIATION ON A NEW POLICY IN SERVICE (20)

ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATIONASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
 
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATIONASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
 
ADAPTIVE MODEL FOR WEB SERVICE RECOMMENDATION
ADAPTIVE MODEL FOR WEB SERVICE RECOMMENDATIONADAPTIVE MODEL FOR WEB SERVICE RECOMMENDATION
ADAPTIVE MODEL FOR WEB SERVICE RECOMMENDATION
 
ADAPTIVE MODEL FOR WEB SERVICE RECOMMENDATION
ADAPTIVE MODEL FOR WEB SERVICE RECOMMENDATIONADAPTIVE MODEL FOR WEB SERVICE RECOMMENDATION
ADAPTIVE MODEL FOR WEB SERVICE RECOMMENDATION
 
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
 
Evaluation of a Framework for Integrated Web Services
Evaluation of a Framework for Integrated Web ServicesEvaluation of a Framework for Integrated Web Services
Evaluation of a Framework for Integrated Web Services
 
Gc3310851089
Gc3310851089Gc3310851089
Gc3310851089
 
Gc3310851089
Gc3310851089Gc3310851089
Gc3310851089
 
Collaborative policy administration
Collaborative policy administrationCollaborative policy administration
Collaborative policy administration
 
A Formal Framework for SAAS Customization Based on Multi-Layered Architecture...
A Formal Framework for SAAS Customization Based on Multi-Layered Architecture...A Formal Framework for SAAS Customization Based on Multi-Layered Architecture...
A Formal Framework for SAAS Customization Based on Multi-Layered Architecture...
 
IRJET - Customer Churn Analysis in Telecom Industry
IRJET - Customer Churn Analysis in Telecom IndustryIRJET - Customer Churn Analysis in Telecom Industry
IRJET - Customer Churn Analysis in Telecom Industry
 
Collaborative policy administration
Collaborative policy administrationCollaborative policy administration
Collaborative policy administration
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com
 
WS-PolicyAttachment: Message Content Filters 1.1
WS-PolicyAttachment: Message Content Filters 1.1WS-PolicyAttachment: Message Content Filters 1.1
WS-PolicyAttachment: Message Content Filters 1.1
 
8367 collaborative policy-administration-pdf
8367 collaborative policy-administration-pdf8367 collaborative policy-administration-pdf
8367 collaborative policy-administration-pdf
 
DDS-TSN OMG Request for Proposals (RFP)
DDS-TSN OMG Request for Proposals (RFP)DDS-TSN OMG Request for Proposals (RFP)
DDS-TSN OMG Request for Proposals (RFP)
 
Automatic Management of Wireless Sensor Networks through Cloud Computing
Automatic Management of Wireless Sensor Networks through Cloud ComputingAutomatic Management of Wireless Sensor Networks through Cloud Computing
Automatic Management of Wireless Sensor Networks through Cloud Computing
 
How to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHow to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq Hanaysha
 
Time-Ordered Collaborative Filtering for News Recommendation
Time-Ordered Collaborative Filtering for News RecommendationTime-Ordered Collaborative Filtering for News Recommendation
Time-Ordered Collaborative Filtering for News Recommendation
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
 

Recently uploaded

EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 

Recently uploaded (20)

EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 

NEGOTIATION ON A NEW POLICY IN SERVICE

  • 1. International Journal on Web Service Computing (IJWSC), Vol.5, No.4, December 2014 DOI : 10.5121/ijwsc.2014.5401 1 NEGOTIATION ON A NEW POLICY IN SERVICE Fereshteh Bayat and Afshin Salajegheh and Yousef Rastegari . M.S. Graduate of Software Engineering,Azad University South Branch,tehran,Iran Ph.D Assistant Professor of Software Engineering and Computer Science IAU Tehran South Branch,Tehran,Iran Ph.D. Candidate of Shahid Beheshti University, Electrical & Computer Engineering Department, Tehran, Iran ABSTRACT During interactions between organizations in the field of service-oriented architecture, some security requirements may change and new security policies addressed. Security requirements and capabilities of Web services are defined as security policies. The purpose of this paper is reconciliation of dynamic security policies and to explore the possibility of requirements of the new defined security policies. During the process of applying the defined dynamic policy, is checked whether the service provider can accept the new policy or not. Therefore, the compatibility between existing policies and new defined policies are checked, and because the available algorithms for sharing between the two policies, resulted in duplication and contradictory assertion, in this paper for providing a compromise between the provided policy and the new policy, the fuzzy inference method mamdany is used . and by comparing the security level of proposed policy with the specified functionality, the negotiating procedure is done . The difference between the work done in this paper and previous works is in fuzzy calculation and conclusion for negotiations. the advantages of thi work is that policies are defined dynamically and applied to bpel , also can be changed independently of bpel file. KEYWORDS Policy,Policy Attachment,Negotiation 1. INTRODUCTION In general, to determine which web service is appropriate for a specific application, functional capabilities should be adapt able with functional requirements and also non-functional capabilities in Web service should meet non-functional requirements. Consumer and provider of Web services, define their requirements and security policies as XML files named ws-policy. WS- policy provides a basic structure to describe a wide range of requirements and capabilities of Web services. In this paper, the changes are security changes and while applying new policies to processes , check whether the service provider will be accept the new policy or not. In part 2, the structure of policies is defined. In part 3, the framework will be described and check the ability to dynamically negotiate on new policy. If the negotiation success , the new policy will be dynamically applied. The fuzzy tools of Matlab is used for implementation of proposed method. Section four presents the conclusions and suggestions for future deals.
  • 2. International Journal on Web Service Computing (IJWSC), Vol.5, No.4, December 2014 2 2. WS-POLICY STRUCTURE WS-Policy (Web Service Policy) is used to describe the quality of service. WS- Policy, is a general-purpose model for describing Web service policies, which including blocks to exchange their policies. WS-Policy defines a policy as a set of alternative which each alternative is a set of assertions. indeed assertions describe requirements and functionalities of the Web service. The main structure of a policy in the normal form is as follows: <wsp:Policy … > <wsp:ExactlyOne> ( <wsp:All> ( <Assertion …> … </Assertion> )* </wsp:All> )* </wsp:ExactlyOne> </wsp:Policy> Listing 1 : normal ws-policy structure The following example represents the normal form of a policy: (01) <wsp:Policy xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy" xmlns:wsp="http://schemas.xmlsoap.org/ws/2004/09/policy" > (02) <wsp:ExactlyOne> (03) <wsp:All> (04) <sp:Basic256Rsa15 /> (05) </wsp:All> (06) <wsp:All> (07) <sp:TripleDesRsa15 /> (08) </wsp:All> (09) </wsp:ExactlyOne> (10) </wsp:Policy> Listing 2 : ws-policy example 3. PROBLEM PLAN In order to provide security during data exchange between the services, should service providers and requester agree on their capabilities and requirements. The WS-Policy does not offer a negotiated solution over the web service policies. During interactions between organizations, some Web Service security requirements may be changed and the new security policy is defined. In order to dynamically attach policies to bpel and negotiate on the proposed policy, outlined framework in section 4 is provided. 4 . PROPOSED FRAMEWORK To attach new policy to BPEL externally and negotiate on policies, outlined framework in Figure 1 is provided. The proposed policy is attached on the two input files and how to attach is reflected. Before the change of policy attachment file, a lock is set on policy file to prevent changes during policy attachment process. Then policies and activities that policies be attached to are identified and a mapping between the scope's activities and the new corresponding policy is created. In order to link a defined external policy with BPEL activities, WS-Policy Attachment structure is used . Attached files are XML files containing “Applies to” element and, “selector”;
  • 3. International Journal on Web Service Computing (IJWSC), Vol.5, No.4, December 2014 3 the child element. The selector is, an XPATH expression to select an activity within bpel scope. It also contains another element called PolicyReference which includes a reference to a policy. For example, the proposed policy by the name “ATM_new_Policy” . apply to “createTicket” activity as follows: Listing 3 : policy attachment And content of the new policy of ATM_new_Policy are: Listing 3 : policy Listing 3 : policy Listing 4 ATM_new_Policy Figure 1 : proposed framework for new policy attachment and negotiation <wsp:PolicyAttachment xmlns:wsp=”http://schemas.xmlsoap.org/ws/policy/” xmlns:bpel=”http://schemas.xmlsoap.org/ws/business−process/”> <wsp:AppliesTo> <bpat:selector> //bpel:scope[@name=”TicketCreationUnit”]//bpel:invoke[@operation=”createTicket”] </bpat:selector> </wsp:AppliesTo> <wsp:PolicyReference URI=” http://schemas.xmlsoap.org/ws/securitypolicy./ATM_new_Policy”/> </wsp:PolicyAttachment> <wsp:Policy Xmlns:wsu = “http://schemas.xmlsoap.org/ws/securitypolicy” Wsu:Id=”ATM_new_Policy”> <wsp:ExactlyOne> <wsp:All> <sp:AlgorithmSuite> <sp:Basic256/> </sp:AlgorithmSuite> <sp: AuthenticationToken> <sp:UsernameToken/> </sp: AuthenticationToken > </wsp:All> </wsp:ExactlyOne> </wsp:Policy>
  • 4. International Journal on Web Service Computing (IJWSC), Vol.5, No.4, December 2014 4 Figure 1 : proposed framework for new policy attachment and negotiation We will describe Figure 1 at below: Analyze: when it turns to perform an bpel activity within the particular bpel scope, searching begins in the mapping file,to determine whether new policy for proposed activitiy is defined or not. If the policy is not defined, bpel engine is notified to continue its work. If the new policy is defined, then it is surveyed that the proposed policy is new to attach to the activity or is already applied. Renegotiate: In this part, fuzzy calculations are done for all alternatives in the proposed policy. If the security level for at least one alternative is supported by provider, negotiation will be done, if not ,another supplier is reselect. Fuzzy Unit: in order to negotiate for accepting the new policy, the degree of provided security by the new policy is calculated according to the fuzzy calculations and then compared with provider's capabilities. Table 1 : Algorithm_Suite Table 1 : Algorithm_Suite Assigned_number AlgorithmSuite 16Basic256 15Basic192 14Basic128 13TipleDes 12Basic256Rsa15 11Basic192Rsa15 10Basic128Rsa15 9TripleDesRsa15 8Basic256Sha256
  • 5. International Journal on Web Service Computing (IJWSC), Vol.5, No.4, December 2014 5 7Basic192Sha256 6Basic128Sha256 5TripleDesSha256 4Basic256Sha256Rsa15 3Basic192Sha256Rsa15 2Basic128Sha256Rsa15 1TripleDesSha256Rsa15 0No-algorithm Table 2 : AuthenticationToken Assigned_numberAthenticationToken 9X509Token 8KerberosToken 7SamlToken 6RelToken 5SecureConversationToken 4SecurityContextToken 3SpnegoContextToken 2IssuedToken 1UsernameToken 0No-algorithm Table 1 represents a sequence of algorithms and the sequence of tokens are described in Table 2. Algorithm Suite and Authentication Token are assertion types of policy. The left column of table 1 is from the strongest to the weakest algorithm and the left column of table2 is from the strongest to the weakest authentication token . For example TripleDesSha256Rsa15 and Username Token are the weakest .[4] For each input variable Algorithm Suite, Authentication Token and security output variable, fuzzy sets are defined in accordance with membership functions in Figures 2, 3 and 4. Figure 2 : algorithmSuite membership function Figure 3 : authenticationToken membership function
  • 6. International Journal on Web Service Computing (IJWSC), Vol.5, No.4, December 2014 6 Figure 4 :security membership function Based on fuzzy calculation steps and defined fuzzy rules, output fuzzy calculation, for the proposed ATM_new_Policy would be accordance with Figure 5. Figure 5 : Fuzzy Mamdani method output in Matlab The final step is to calculate a value corresponding to the security level which is the center of gravity for the aggregsted area in figure 5. In the example above, as can be seen in Figure 2 Calculated security level is equal to 60. In accordance to obtained number = 60, and the provider capability for the security policy is defined between 60 and 70, then negotiation will be performed. In fact, the fuzzy calculations for all new policy alternatives is done and if at least the security level of one alternative is supported by provider, the negotiation will be done but if the calculated security level of none of the alternatives is not included in the capability range of provider, then another provider will be selected. Enforce policy: After doing the above steps, bpel engine attachment file corresponding to input attachment file will be modified and during the execution of the corresponding activity in bpel, the proposed policy will apply. Input attachment will be unlocked to be accessible for future changes. 5. CONCLUSIONS WS-policy is used to specify the security features of web services . In this paper a framework is proposed to attach a new policy to bpel activitiy dynamically and negotiate between requester and provider . Among the advantages that can point for the proposed framework , is that external attachment of policies to bpel distinct the business process logic from describtion of quality of service . The policies and BPEL files can be changed independently of each other. In addition, the policies can be changed at runtime. It also reduces the complexity of BPEL processes,increase maintainability and changability of bpel processes.
  • 7. International Journal on Web Service Computing (IJWSC), Vol.5, No.4, December 2014 7 REFERENCES [1] S.Bajaj,D.Box,F.Chappell “Web Service Policy 1.2 - Framework (WS-Policy) , W3C Member Submission 25 April 2006 [2] G.Della-Libera,M.Gudgin “Web Services Security Policy Language (WS-SecurityPolicy)” ,IBM,Microsoft,RSA,Verisign, July 2005 [3] A.Charfi,R.Khalaf,N.Mukhi “QOS-aware web service composition using non-intrusive policy attachment to bpel”,Springer ,pp.582-593 , 2007 [4] T.Lavarack,M.Coetzee “Considering web services security policy compatibility” , IEEE Information Security for South Africa (ISSA) , august 2010 [5] A.Strunk,S.Reichert,A.Schill “An Infrastructure for supporting Rebinding in BPEL Processes”,IEEE Enterprise Distributed Object Computing Conference Workshops , pp.230-237,Sept.2009 [6] M.Negnevitsky “Artificial Intelligence: A Guide to Intelligent Systems” , Pearson Education , 2009