skip to main content
10.1145/2591062.2591083acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
Article

COASTmed: software architectures for delivering customizable, policy-based differential web services

Published:31 May 2014Publication History

ABSTRACT

Inter-organizational exchange of personal information raises significant challenges in domains such as healthcare. First, trust among parties is not homogenous; data is shared according to complex relations. Second, personal data is used for unexpected, often divergent purposes. This tension between information need and provision calls for custom services whose access depends on specific trust and legal ties. Current Web services are "one-size-fits-all" solutions that do not capture nuanced relations nor meet all users' needs. Our goal is providing computation-enabled services which: (a) are accessible based on providers' policies, and; (b) allow user-controlled customization within the authority granted. We present our proposed solutions in COASTmed, a prototype for electronic health record (EHR) management which leverages novel architectural principles and formal policies.

References

  1. A. Anderson. An introduction to the web services policy language (WSPL). In 5th IEEE International Workshop on Policies for Distributed Systems and Networks., pages 189–192, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Y. Becker and P. Sewell. Cassandra: Distributed access control policies with tunable expressiveness. In 5th IEEE International Workshop on Policies for Distributed Systems and Networks, pages 159–168, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. M. Eyers, J. Bacon, and K. Moody. OASIS role-based access control for electronic health records. IEE Proceedings-Software, 153(1):16–23, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  4. M. M. Gorlick, K. Strasser, and R. N. Taylor. Coast: An architectural style for decentralized on-demand tailored services. In Joint Working IEEE/IFIP Conference on Software Architecture and European Conference on Software Architecture, pages 71–80, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. L. Kagal, T. Finin, and A. Joshi. A policy based approach to security for the semantic web. In The Semantic Web - ISWC 2003, number 2870 in Lecture Notes in Computer Science, pages 402–418. Springer Berlin Heidelberg, Jan. 2003.Google ScholarGoogle Scholar
  6. L. Kagal, T. Finin, M. Paolucci, N. Srinivasan, K. Sycara, and G. Denker. Authorization and privacy for semantic web services. IEEE Intelligent Systems, 19(4):50–56, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. R. Kazman, G. Abowd, L. Bass, and P. Clements. Scenario-based analysis of software architecture. IEEE Software, 13(6):47–55, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. P. Kumaraguru, L. Cranor, J. Lobo, and S. Calo. A survey of privacy policy languages. In 3rd ACM Symposium on Usable Privacy and Security, 2007.Google ScholarGoogle Scholar
  9. A. Rezgui, M. Ouzzani, A. Bouguettaya, and B. Medjahed. Preserving privacy in web services. In 4th international workshop on Web information and data management, pages 56–62, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Wong and J. I. Hong. Making mashups with marmite: Towards end-user programming for the web. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’07, pages 1435–1444, New York, NY, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. E. Yuan and J. Tong. Attributed based access control (ABAC) for web services. In IEEE International Conference on Web Services, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. COASTmed: software architectures for delivering customizable, policy-based differential web services

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      ICSE Companion 2014: Companion Proceedings of the 36th International Conference on Software Engineering
      May 2014
      741 pages
      ISBN:9781450327688
      DOI:10.1145/2591062

      Copyright © 2014 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 31 May 2014

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate276of1,856submissions,15%

      Upcoming Conference

      ICSE 2025
    • Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader