 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
| n |
Provide
usage scenarios (with
focus security ) for DAML-S
|
|
|
| n |
Separation of
concern: policy vs enforcement
|
|
|
|
l |
Provide
challenge examples of policies (e.g., access control to
|
|
|
service,
interaction with authenticated clients)
|
|
|
|
l |
And
their enforcement (e.g., Kerberos as authentication service)
|
|
|
|
l |
Same for trust/privacy
|
|
|
| n |
Provide
reasoning mechanism for selected security policies
|
|
|
| n |
Integration
of role-based, capability-based, ACL models in
|
|
|
existing
security ontologies
|
|
|
| n |
Describe
core security related services
|
|
|
|
l |
E.g.,
authentication/authorization service, encryption service, policy
|
|
compatibility
checking service
|
|