Security policy validation for web services

A web service and security technology, applied in the field of security policy verification of web services, can solve problems such as full SOA environment

Inactive Publication Date: 2010-08-25
INT BUSINESS MASCH CORP
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the prior art, the process of determining whether the security policy matches the security profile is a manual process, fraught with errors due to the complexity of the SOA environment
Thus, the reader will understand that there is room for improvement in the validation of security policies for web services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security policy validation for web services
  • Security policy validation for web services
  • Security policy validation for web services

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] Starting from FIG. 1 , an exemplary method, device, and product for security policy verification of web services according to an embodiment of the present invention are described with reference to the accompanying drawings. FIG. 1 depicts a functional block diagram of an exemplary system capable of security policy validation for web services, according to an embodiment of the present invention. The exemplary system of FIG. 1 includes several computing devices (152, 120, 122, 124) connected together by a network (100) for data communication. A web service (108, 110, 112, 114) is installed on each computing device (152, 120, 122, 124), respectively. A web service is software designed to support interoperable machine-to-machine interactions over a network. Web services are frequently accessed over a network through a web application programming interface (API) and executed on a remote system that hosts the requested web service. APIs for web services are typically descri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Methods, apparatus, and products are disclosed for security policy validation for web services that include: transforming a security policy for a web service into a policy predicate logic representation; providing a profile predicate logic representation that represents one or more rules of a security policy profile; and determining whether the security policy satisfies the security policy profile in dependence upon the policy predicate logic representation and the profile predicate logic representation.

Description

technical field [0001] The field of the invention relates to data processing, or, more specifically, to methods, devices and products for security policy validation of web services. Background technique [0002] Many enterprises are currently developing using a service-oriented architecture (SOA) as their business models change more frequently. SOA makes application development easier because technology-independent services can be coupled on an intranet or via the Internet. As business models change more frequently, the underlying computing environments on which applications run are becoming more complex, as computers can be networked using complex topologies, including firewalls and intermediate servers. Therefore, proper configuration of non-functional aspects such as security requires a fairly deep understanding of this complex environment. [0003] In light of this development, it is important to align security with the software engineering process from the start. Unf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/24H04L29/06
CPCG06F21/604H04L63/168H04L63/20
Inventor 钟显维中村祐一佐藤史子
Owner INT BUSINESS MASCH CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products