3
Discovery and Resolution of Anomalies in Web Access Control Policies ABSTRACT : Emerging computing technologies such as web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from unintended security leakages by unauthorized actions in business services while providing more convenient services to Internet users through such a cutting-edge technological growth. Furthermore, designing and managing web access control policies are often error-prone due to the lack of effective analysis mechanisms and tools. In this paper, we represent an innovative policy anomaly analysis approach for web access control policies, focusing on GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS| IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsem[email protected]

IEEE 2014 JAVA NETWORK SECURITY PROJECTS Discovery and resolution of anomalies in web access control policies

Embed Size (px)

DESCRIPTION

To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - [email protected] Our Website: www.finalyearprojects.org

Citation preview

Page 1: IEEE 2014 JAVA NETWORK SECURITY PROJECTS Discovery and resolution of anomalies in web access control policies

Discovery and Resolution of Anomalies in Web Access Control Policies

ABSTRACT : Emerging computing technologies such as web services, service-

oriented architecture, and cloud computing has enabled us to perform business

services more efficiently and effectively. However, we still suffer from unintended

security leakages by unauthorized actions in business services while providing

more convenient services to Internet users through such a cutting-edge

technological growth. Furthermore, designing and managing web access control

policies are often error-prone due to the lack of effective analysis mechanisms and

tools. In this paper, we represent an innovative policy anomaly analysis approach

for web access control policies, focusing on extensible access control markup

language policy. We introduce a policy-based segmentation technique to

accurately identify policy anomalies and derive effective anomaly resolutions,

along with an intuitive visualization representation of analysis results. We also

discuss a proof-of-concept implementation of our method called XAnalyzer and

demonstrate how our approach can efficiently discover and resolve policy

anomalies.

SYSTEM CONFIGURATION:-

GLOBALSOFT TECHNOLOGIESIEEE PROJECTS & SOFTWARE DEVELOPMENTS

IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE

BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS

CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401

Visit: www.finalyearprojects.org Mail to:[email protected]

Page 2: IEEE 2014 JAVA NETWORK SECURITY PROJECTS Discovery and resolution of anomalies in web access control policies

HARDWARE CONFIGURATION:-

Processor - Pentium –IV

Speed - 1.1 Ghz

RAM - 256 MB(min)

Hard Disk - 20 GB

Key Board - Standard Windows Keyboard

Mouse - Two or Three Button Mouse

Monitor - SVGA

SOFTWARE CONFIGURATION:-

Operating System : Windows XP

Programming Language : JAVA

Java Version : JDK 1.6 & above.