TY - JOUR ID - 39190 TI - A model for specification, composition and verification of access control policies and its application to web services JO - The ISC International Journal of Information Security JA - ISECURE LA - en SN - 2008-2045 AU - Derakhshandeh, Z. AU - Tork Ladani, B. AD - Y1 - 2012 PY - 2012 VL - 3 IS - 2 SP - 103 EP - 120 KW - Access Control Policy (ACP) KW - Verification KW - Web Service Composition KW - BPEL KW - Constrained Policy Graph (CPG) DO - 10.22042/isecure.2015.3.2.4 N2 - Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new independent formal model called Constrained Policy Graph (CPG) for specification of ACPs and their composition as well as verification of conflict or incompatibility among the ACPs is represented. It is shown how CPG can be used in modeling and verification of web service composition ACPs. Also the application of CPG for modeling policies in BPEL processes -as the most common composition method for web services- is illustrated. UR - https://www.isecure-journal.com/article_39190.html L1 - https://www.isecure-journal.com/article_39190_b336242ee5b0596f6d483b6191106c58.pdf ER -