thorization engine as part of previous experiences of
content management.
5 RELATED WORK
In security, the use of policies is usually geared to-
wards the specification of security mechanisms that
must ensure authentication, message privacy, and au-
thorization of Web services. We report such efforts.
In (Anderson, 2004), Anderson adopts the Web
Services Policy Language (WSPL) to express poli-
cies and achieve Web services interoperability. She
claims that a Web service has various aspects and fea-
tures that can be controlled or described using policy
rules. Examples of such aspects are authentication,
quality-of-service, privacy, and reliable messaging.
Other languages for policy specification exist
such as the Web Service Policy Framework (WS-
Policy) (Nolan, 2004). A WS-Policy specification
defines a syntax and semantics for service providers
and service requestors to describe their requirements,
preferences, and capabilities. The syntax provides a
flexible and concise way of expressing the needs of
each domain in the form of policies. A domain in
this context is a generic field of interest that applies
to the service and can illustrate one of the following
aspects: security, privacy, application priorities, user
account priorities, and traffic control.
Other service-specific policies have been proposed.
Privacy policies discussed in (Yee and Korba, 2004)
are an example. Yee and Korba propose a pri-
vacy policy negotiation approach to protect privacy
of Web services users. Along the same direction, In-
drakanti et al. make use of the XML Access Control
Language (XACL) to specify authorization policies
for patient records in healthcare systems implemented
as Web services (Indrakanti et al., 2004).
6 CONCLUSION
In this paper we presented a policy-based approach
that aims at securing the contexts associated with Web
services, users, and resources. To authorize any con-
text change, we suggested the development of a secu-
rity context that reports on the strategies that protect
a context using authorization and restriction policies.
These policies protect context from alteration or mis-
use risks by framing the management operations over
this context. By promoting security context, our ob-
jective was to track all the concerns and threats that
affect the content of a context, to deploy appropriate
measures based on previous security contexts, and to
adjust the measures subject to the feedbacks obtained
out of this tracking.
REFERENCES
Anderson, A. H. (2004). An Introduction to The Web
Services Policy Language (WSPL). In Proceedings
of The 5th IEEE Int. Workshop on Policies for Dis-
tributed Systems and Networks (POLICY’2004),New-
York, USA.
Benslimane, D., Mamaar, Z., and Ghedira, C. (2005). A
View-based Approach for Tracking Composite Web
Services. In Proceedings of The Third European Con-
ference on Web Services (ECOWS’2005), Vaxjo, Swe-
den.
Coutaz, J., Crowley, J. L., Dobson, S., and Garlan, D.
(2005). Context is Key. Communications of the ACM,
48(3).
Damianou, N. C. (2002). A Policy Framework for Man-
agement of Distributed Systems. PhD thesis, Imperial
College of Science, Technology and Medicine, Uni-
versity of London, Department of Computing.
Indrakanti, S., Varadharajan, V., and Hitchens, M. (2004).
Authorization Service for Web Services and its Imple-
mentation. In Proceedings of The IEEE Int. Confer-
ence on Web Services (ICWS’2004), San Diego, Cali-
fornia, USA.
Kouadri Most
´
efaoui, G. and Br
´
ezillon, P. (2004). Model-
ing Context-Based Security Policies with Contextual
Graphs. In Proceedings of The Workshop on Con-
text Modeling and Reasoning (CoMoRea’2004) held
in conjunction with The 2nd IEEE Int. Conference
on Pervasive Computing and Communication (Per-
Com’2004), Orlando, Florida, USA.
Maamar, Z., Benslimane, D., and Narendra, N. C. (2006a).
What Can Context do for Web Services? Communi-
cations of the ACM. (to appear).
Maamar, Z., Kouadri Most
´
efaoui, S., and Mahmoud, Q. H.
(2005). On Personalizing Web Services Using Con-
text. Int. Journal of E-Business Research, Special Is-
sue on E-Services, 1(3).
Maamar, Z., Narendra, N. C., and Sattanathan, S. (2006b).
Towards an Ontology-based Approach for Specifying
and Securing Web Services. Journal of Information &
Software Technology, Elsevier Science Publisher. (to
appear).
Nolan, P. (2004). Understand WS-Policy processing. Tech-
nical report, IBM Corporation.
Tonti, G., Bradshaw, J., Jeffers, R., Montanari, R., Suri, N.,
and Uszok, A. (2003). Semantic Web Languages for
Policy Representation and Reasoning: A Comparison
of KAoS, Rei, and Ponder. In Proceedings of The
Second Int. Semantic Web Conference (ISWC’2003),
Sanibel Island, Florida, USA.
Yee, G. and Korba, L. (2004). Privacy Policy Compliance
for Web Services. In Proceedings of The IEEE Int.
Conference on Web Services (ICWS 2004), San Diego,
California, USA.
A POLICY-BASED APPROACH TO SECURE CONTEXT IN A WEB SERVICES ENVIRONMENT
105