Skip to content
Licensed Unlicensed Requires Authentication Published by De Gruyter Oldenbourg May 31, 2014

Utilizing architecture models for secure distributed web applications and services

Stefan Wild and Martin Gaedke


Today's Web applications are often compositions of distributed yet interconnected services that offer features and data through defined interfaces via standardized protocols. Providing a set of best practices for organizing and utilizing distributed capabilities, the service-oriented architecture design pattern largely contributed to this trend. To react on emerging customer requirements, using agile methodology for Web application development fits well in this context. While it allows promptly responding to change by adjusting the Web application architecture, security must be applied as a holistic approach throughout the entire Web application's lifecycle. There is a need for a flexible, expressive and easy-to-use way to model a Web application's architecture with a strong emphasis on security. This article discusses our work on extending the WebComposition Architecture Model towards a semantically enriched description of a Web application's architecture. For enabling systematic exploitation of such architecture descriptions, we utilize W3C's WebID identity mechanism, the WAC authorization method, and fine-grained filters. We explain how WebID can be applied to allow Web services to mutually authenticate and exchange data, e. g., interface definitions and service parameters, in a controlled way.

Received: 2013-9-28
Accepted: 2014-4-4
Published Online: 2014-5-31
Published in Print: 2014-6-28

©2014 Walter de Gruyter Berlin/Boston

Scroll Up Arrow