ABSTRACT:

An application based on the Service-Oriented Architecture (SOA) consists of an assembly of services, which is referred to as a composite service. A composite service can be implemented from other composite services, and hence, the application could have a recursive structure. Securing an SOA application is an important nonfunctional requirement. However, specifying a security policy for a composite service is not easy because the policy should be consistent with the policies of the external services invoked in the composite process. Therefore, this paper proposes a security policy composition mechanism that uses the existing policies of the external services. Our contribution is defining the process-independent policy composition rules and providing a method for semiautomatically creating a security policy of the composite service. Our method supports two approaches of policy composition: top-down and bottom-up. Our study makes it possible to verify the consistency of the policies without increasing a developer's workload, even if the composite service has a recursive structure.


Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here


PROJECT TITLE : Predicting Detection Performance on Security X-Ray Images as a Function of Image Quality ABSTRACT: Research into how image quality impacts work performance is a hot topic in many industries. The security X-ray
MTechProjects.com offering final year Java Based Information Security MTech Projects, Information Security IEEE Projects, IEEE Information Security Projects, Information Security MS Projects, Java Based Information Security BTech
PROJECT TITLE :Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing - 2018ABSTRACT:Virtualized infrastructure in cloud computing has become an enticing target for cyberattackers to
PROJECT TITLE :Transmit-Power Minimization for NOMA-Enabled Traffic Offloading With Security Provisioning - 2018ABSTRACT:Non-orthogonal multiple access (NOMA) has been proposed as an effective technique to deal with the enormous
PROJECT TITLE :Beamforming Optimization for Physical Layer Security in MISO Wireless Networks - 2018ABSTRACT:A wireless network of multiple transmitter-user pairs overheard by an eavesdropper, where the transmitters are equipped

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry