METHODS AND APPARATUS FOR ACCESS CONTROL IN SERVICE-ORIENTED COMPUTING ENVIRONMENTS
First Claim
1. In a service-oriented environment comprising a plurality of services, a method for authenticating a client, the method comprising the steps:
- invoking at least one service of the plurality of services;
associating state information with the at least one service invoked; and
using the state information to authenticate a client with at least one service.
2 Assignments
0 Petitions
Accused Products
Abstract
Improved access control techniques for use in a service-oriented computing environment are disclosed. For example, one method for authenticating a client in a service-oriented environment, wherein the service-oriented environment includes a plurality of services, includes the following steps. At least one service of the plurality of services is invoked. State information is associated with the at least one service invoked. The state information is used to authenticate a client with at least one service. Further, a method for access control in a service-oriented environment, wherein the service-oriented environment includes a plurality of services, includes the following steps. A rule specification language is provided. At least one rule is specified using the rule specification language. A verification is performed to determine whether or not the client satisfies the at least one rule. The client is granted access to a service when the client satisfies the at least one rule.
-
Citations
20 Claims
-
1. In a service-oriented environment comprising a plurality of services, a method for authenticating a client, the method comprising the steps:
-
invoking at least one service of the plurality of services; associating state information with the at least one service invoked; and using the state information to authenticate a client with at least one service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. In a service-oriented environment comprising at least one service, a method for access control, the method comprising the steps of:
-
providing a rule specification language; specifying at least one rule using the rule specification language; verifying whether a client satisfies the at least one rule; and granting the client access to a service if the client satisfies the at least one rule. - View Dependent Claims (16, 17, 18)
-
-
19. Apparatus for authenticating a client in a service-oriented environment comprising a plurality of services, the apparatus comprising:
-
a memory; and at least one processor coupled to the memory and operative to;
(i) invoke at least one service of the plurality of services;
(ii) associate state information with the at least one service invoked; and
(iii) use the state information to authenticate a client with at least one service.
-
-
20. Apparatus for access control in a service-oriented environment comprising a plurality of services, the apparatus comprising:
-
a memory; and at least one processor coupled to the memory and operative to;
(i) provide a rule specification language;
(ii) specify at least one rule using the rule specification language;
(iii) verify whether a client satisfies the at least one rule; and
(iv) grant the client access to a service if the client satisfies the at least one rule.
-
Specification