27.03.2014 Views

SEKE 2012 Proceedings - Knowledge Systems Institute

SEKE 2012 Proceedings - Knowledge Systems Institute

SEKE 2012 Proceedings - Knowledge Systems Institute

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Non-repudiation security service protects against one<br />

party to a transaction later falsely denying that the<br />

transaction occurred. Non-repudiation security<br />

services can be realized using digital signatures [13].<br />

Access control security service protects a gainst<br />

unauthorized access to valuable resources. Access<br />

control may be implemented using mandatory access<br />

control (MAC) or role-based access control [12, 16].<br />

Authentication security service allows an entity (a<br />

user or system) to identify itself positively t o another<br />

entity. This can be achieved using a password,<br />

personal-identification number or challenge response.<br />

Typical message communication patterns between<br />

components are asynchronous (loosely coupled) m essage<br />

communication and synchronous (tightly couple d)<br />

message communication [9], although there are other<br />

types of c ommunications between components. An<br />

asynchronous message is sent from a sender component to<br />

a receiver component and is stored i n a queue if the<br />

receiver is busy. The sender component can continue to<br />

send the next message to the receiver component as long<br />

as the que ue is not full. In sy nchronous message<br />

communication, a sender component sends a message to a<br />

receiver component and waits for a response from the<br />

receiver. When a response arrives from the receiver, the<br />

sender can continue to work and send the next message to<br />

the receiver.<br />

A distributed secure synch ronous connection is<br />

provided by means of a pair of c onnectors, namely a<br />

secure synchronous sender connector a nd a sec ure<br />

synchronous receiver connector. The secure synchronous<br />

sender and receiv er connectors act as stub s sending and<br />

receiving messages for the ir respective components.<br />

When the s ecure sender connector receives a message<br />

from the sender component, it ap plies the security<br />

services to the message if required by the component. The<br />

secured message is packed by the secure sender<br />

connector, which sends it to the secure synchronous<br />

receiver connector. When the receiver connector receives<br />

a secured and packed message, it c hecks the security of<br />

message and unpacks the message before sending it to the<br />

receiver component. Conversely, a response is sent from<br />

the receiver c omponent to the sender component via<br />

secure connectors. If the response requires security<br />

services, the secure connectors apply the appropriate<br />

security services.<br />

Fig. 1 depicts secure synchronous sender and receiver<br />

connectors for browsing a c atalog that re quires catalog<br />

access control and cust omer identity confidentiality<br />

security services between the Customer and Catalog<br />

application components in the business to business (B2B)<br />

electronic system. A custom er browses through va rious<br />

WWW catalogs and views various catalog items from a<br />

given supplier's catalog. The customer may need<br />

permission to access a specific catalog, and the customer<br />

identity for access control may also nee d to be<br />

confidential. These security requirements are handled by<br />

two secure synchronous connectors, the secure<br />

synchronous Customer Interface connector for Customer<br />

Interface application com ponent and the secure<br />

synchronous Catalog Server connector for Catalog Server<br />

component. The security services for c atalog access<br />

control and custom er identity confidentiality are<br />

encapsulated in the secure synchronous Custom er<br />

Interface and Catalog Server connectors, separately from<br />

Customer Interface and Catalog Server components.<br />

<br />

aSynchronousCustomer<br />

InterfaceConnector<br />

<br />

:Customer<br />

Stub<br />

A1.1: Request Catalog Index<br />

A2.2: Encrypted Customer Identity &<br />

Catalog Selection<br />

<br />

:Encryption<br />

Agent<br />

A2.1 [Customer Identity<br />

requires confidentiality]:<br />

Encrypt (in Customer Identity,<br />

out Encrypted Customer Identity)<br />

A1.5: Catalog Index<br />

A2.8: Catalog<br />

A1.4: Catalog Index<br />

A2.7: Catalog<br />

<br />

:Network<br />

A1.2: Request Catalog Index<br />

A2.3: Encrypted Customer Identity &<br />

Catalog Selection<br />

A1: Request (out Catalog<br />

Index)<br />

A2: Catalog Selection (in<br />

Customer Identity, out<br />

Catalog)<br />

<br />

aCustomerInterface<br />

<br />

aSynchronousCatalog<br />

ServerConnector<br />

<br />

:DecryptionAgent<br />

<br />

:AccessControlAgent<br />

A2.4 [Customer Identity<br />

requires confidentiality]:<br />

Decrypt (in Encrypted<br />

Customer Identity, out<br />

Customer Identity)<br />

A2.5 [Catalog requires access<br />

control]: Authorize (in Customer<br />

Identity, in Catalog Selection, out<br />

Permission)<br />

<br />

:Catalog<br />

ServerStub<br />

A1.3: Request Catalog Index<br />

(out Catalog Index)<br />

A2.6 [Authorized]: Request (out<br />

Catalog)<br />

<br />

:aCatalogServer<br />

Fig. 1 Secure Synchronous Connector for Confidentiality and Access Control security services<br />

396

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!