Secure Systems Research Group - FAU Using patterns to compare web services standards E. Fernandez and N. Delessy.

Slides:



Advertisements
Similar presentations
Tuesday, June 10, 2003 Web Services Brief Overview & Security Assertion Coordinator Pattern by Mohammad Abushadi & Riaz Ahmed for Security Group CSE -
Advertisements

Administrative Policies in XACML Erik Rissanen Swedish Institute of Computer Science.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
SOA and Web Services. SOA Architecture Explaination Transport protocols - communicate between a service and a requester. Messaging layer - enables the.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Web Services and the Semantic Web: Open Discussion Session Diana Geangalau Ryan Layfield.
A Pattern-Driven Security Process for SOA Applications
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
Secure Systems Research Group - FAU Patterns for access control E.B. Fernandez.
© 2009 The MITRE Corporation. All rights Reserved. April 28, 2009 MITRE Public Release Statement Case Number Norman F. Brickman, Roger.
OpenID And the Future of Digital Identity Alicia Bozyk April 1, 2008.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
Terregov: eGovernment interoperability on a semantically driven world Interop-ESA/eGov Interop conference Geneva, February 2005 Santos Vicente, María Pérez,
Web services security I
Secure Systems Research Group - FAU Web Services Standards Presented by Keiko Hashizume.
Audumbar. Access control and privacy Who can access what, under what conditions, and for what purpose.
1 © Talend 2014 XACML Authorization Training Slides 2014 Jan Bernhardt Zsolt Beothy-Elo
IBM Proof of Technology Discovering the Value of SOA with WebSphere Process Integration © 2005 IBM Corporation SOA on your terms and our expertise WebSphere.
Web Service Standards, Security & Management Chris Peiris
Authorization Infrastructure, a Standards View Hal Lockhart OASIS.
Secure Systems Research Group - FAU A Pattern-Driven Process for Secure Service-Oriented Applications Ph.D Dissertation Defense Candidate: N. A. Delessy,
1 A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Presented by Liping Cai 03/15/2006.
Florida Atlantic University Department of Computer and Electrical Engineering &Computer Science ( CEECS ) Secure Systems Research Group Fall 2009 “A Pattern.
Computer Science and Engineering 1 Service-Oriented Architecture Security 2.
Secure Systems Research Group - FAU Securing Service-Oriented Architectures using a Model-driven Approach Nelly A Delessy.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
United States Department of Justice Implementing Privacy Policy in Justice Information Sharing: A Technical Framework John Ruegg,
A Flexible Access Control Model for Web Services Elisa Bertino CERIAS and CS Department, Purdue University Joint work with Anna C. Squicciarini – University.
SAML in Authorization Policies draft-guenther-geopriv-saml-policy-00.
Secure Systems Research Group - FAU Patterns for Web Services Security Standards Presented by Keiko Hashizume.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
W3C Web Services Architecture Security Discussion Kick-Off Abbie Barbir, Ph.D. Nortel Networks.
Workshop Presentation [1] Investigating Liberty Alliance and Shibboleth Integration Nishen Naidoo, Supervisor: Dr. Steve Cassidy.
Semantic Web Technologies Research Topics and Projects discussion Brief Readings Discussion Research Presentations.
Access Control and Markup Languages Pages 183 – 187 in the CISSP 1.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
Secure Systems Research Group - FAU A Trust Model for Web Services Ph.D Dissertation Progress Report Candidate: Nelly A. Delessy, Advisor: Dr E.B. Fernandez.
Proposal for RBAC Features for SDD James Falkner Sun Microsystems October 11, 2006.
Infrastructure Service Approach to Handling Security in Service-Oriented Architecture Business Applications Doina Iepuras.
Secure Systems Research Group - FAU 1 A Trust Model for Web Services Ph.D Dissertation Progess Report Candidate: Nelly A. Delessy, Advisor: Dr E.B. Fernandez.
MODEL-BASED SOFTWARE ARCHITECTURES.  Models of software are used in an increasing number of projects to handle the complexity of application domains.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
Secure Systems Research Group - FAU A Pattern for XML Signature Presented by Keiko Hashizume.
1 Access Control Policies: Modeling and Validation Luigi Logrippo & Mahdi Mankai Université du Québec en Outaouais.
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Globus: A Report. Introduction What is Globus? Need for Globus. Goal of Globus Approach used by Globus: –Develop High level tools and basic technologies.
Business Goal-Driven Optimization of Business Process in EERP James Wei Guo, eBridge China Symon Chang, BEA Systems Inc. April 29, 2008 Copyright © 2008.
The UW-Madison IAM Experience Building our Dream Home Presented by Steve Devoti, Senior IT Architect © 2007 Board of Regents of the University of Wisconsin.
Andrew J. Hewatt, Gayatri Swamynathan and Michael T. Wen Department of Computer Science, UC-Santa Barbara A Case Study of the WS-Security Framework.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks OpenSAML extension library and API to support.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
OGSA Attributes: Requirements, Definitions, and SAML Profile Abstract This document specifies elements and vocabulary for expressing attribute assertions.
ESRIN, 15 July 2009 Slide 1 Web Service Security support in the SSE Toolbox HMA-T Phase 2 FP 14 December 2009 S. Gianfranceschi, Intecs.
Service Oriented Architecture (SOA) Prof. Wenwen Li School of Geographical Sciences and Urban Planning 5644 Coor Hall
Access Policy - Federation March 23, 2016
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Web Ontology Language for Service (OWL-S)
Web Services Security Challenges
Extending a secure development methodology to distributed systems
Presentation transcript:

Secure Systems Research Group - FAU Using patterns to compare web services standards E. Fernandez and N. Delessy

Secure Systems Research Group - FAU Introduction WS enable the creation of new applications through web services composition  implement a Service-Oriented Architecture (SOA) involve a number of web services providers, possibly from different organizations. these providers may not even know each other in advance, and could discover each other on the fly  security of these applications is challenging.

Secure Systems Research Group - FAU Introduction problem with WS security standards: several organizations are involved in developing them  there are many, and they may overlap Several commercial products,(web services firewalls, XML VPNs, or identity management solutions,...) implement security for web services lack of clarity in the web services security standards map  difficult for vendors to develop products that comply with standards and for users to decide what product to use. Users are also confused when selecting products because it is not clear sometimes what standards are supported by a given product.

Secure Systems Research Group - FAU Introduction We are developing a catalog of security patterns Another aspect: how to compare standards using patterns? Using patterns: –we can verify if an existing product implementing a given security mechanism supports some specific standard. –a product vendor can use the standards to guide the development of the product. –we can compare standards and understand them better. For example, we can discover overlapping and inconsistent aspects between them.

Secure Systems Research Group - FAU Web services security patterns

Secure Systems Research Group - FAU Comparing product architectures to standards Choose two aspects to compare from the diagram (the implementation of a standard by a generic product) here the Application Firewall pattern and the XACML Access Control Evaluation pattern

Secure Systems Research Group - FAU Application Firewall

Secure Systems Research Group - FAU XACML access control evaluation

Secure Systems Research Group - FAU Comparison the structure of the Application firewall pattern is too simple to support a complex standard such as XACML: –the concepts of Policy Decision Point and Policy Administration Point are included in the Policy Authorization Point, –there is no way to handle descriptors for subjects, objects, and predicates.

Secure Systems Research Group - FAU Comparing standards we choose a pair of standards to compare, we consider XACML Policy Language against WS-Policy.

Secure Systems Research Group - FAU XACML Policy Language

Secure Systems Research Group - FAU WS-Policy

Secure Systems Research Group - FAU Comparison To compare two standards, we can look for similarities in their context and in the problem they solve. When they are similar enough, we can compare the way they solve the problem, balance their respective advantages and liabilities.

Secure Systems Research Group - FAU Comparison These two patterns use policies to solve two different problems. Also, their context is different: First, WS-Policy is intended for securing Web Services, whereas XACML is more general. Second, an XACML policy is used by the organization’s Reference Monitor to control access to an organization’s resources (services or documents) whereas a WS-Policy is bound to a specific Web service endpoint. A WS-Policy policy can be used to expose the web service’s requirements and then can be used in the access negotiation with the requester.

Secure Systems Research Group - FAU Comparison Therefore, XACML is to be used in a centralized context in which one Reference Monitor controls access to many web resources. For example, an application firewall could use XACML policies, (which are a subset of the XACML standard). WS-Policy is to be used in a decentralized context where each Web service provider has or implements a Reference Monitor to control access to it. For example, it could be used when an application is built by automatically composing web services from different organizations. Such an application could be a travel agency application that has to contact several flight booking services, hotel reservation services, …

Secure Systems Research Group - FAU Comparison The problem resolved by WS-Policy is similar to the one solved by WSPL. WSPL describes accesses as combinations of the requester, the resource and the environment’s attributes, whereas WS-Policy describes accesses in terms of assertions, which is an extensible concept. Another standard, defined by the same committee, WS-SecurityPolicy, extends WS- Policy and defines the integrity and the confidentiality assertions which can correspond to some environment’s attributes in XACML. Also, the security token defined in WS-Security can correspond to a user’s attribute.

Secure Systems Research Group - FAU Comparison However, minor dissimilarities exist between these two standards in terms of: –Attributes/assertion operators: WSPL allows a wide range of comparisons…whereas WS-Policy : “=” – negative policies (only WSPL), – the concept of obligation (only WSPL), – the definition of the semantics for attributes/assertions: An Assertion may be a complex XML type, it is domain-dependent. WSPL assertions are from standards data types, and are extensible thus can be processed automatically.

Secure Systems Research Group - FAU WS- Security

Secure Systems Research Group - FAU WS-*

Secure Systems Research Group - FAU Conclusion In the future we will continue to compare standards against each other. We also need to develop more patterns to describe standards such as SAML and others.