Modular plans for secure service composition

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modular Plans for Secure Service Composition

Service Oriented Computing (SOC) is a programming paradigm aiming at characterising Service Networks. Services are entities waiting for clients requests and they often result from the composition of many services. We address here the problem of statically guaranteeing security of open services, i.e. services with unknown components. Security constraints are expressed by local policies that serv...

متن کامل

Plans for service composition

We study how to compose services in the presence of security constraints. By analysing the abstract behaviour of a set of services, we are able to determine the plans that drive safe program executions. These plans can be of different kinds, and we study here three of them, with different expressive power. Simple plans choose a single service for each request; multi-choice plans instead can cho...

متن کامل

Efficient Intelligent Secure for Web Service Composition

Service-Oriented Architecture (SOA) provides a flexible framework for web service composition. Using standard based protocols (such as SOAP and WSDL), composite services can be constructed by integrating atomic services developed independently. For each service in the composition, many service providers can offer the same function but may have different non-functional attributes (i.e. security,...

متن کامل

Information Flow Control to Secure Dynamic Web Service Composition

The vision of a landscape of heterogeneous web services deployed as encapsulated business software assets in the Internet is currently becoming a reality as part of the Semantic Web. When pro-active agents handle the context-aware discovery, acquisition, composition, and management of application services and data, ensuring the security of customers’ data becomes a principle task. To dynamicall...

متن کامل

SECURE SERVICE COMPOSITION WITH INFORMATION FLOW CONTROL by

services (uniform distribution) and submits it to the service composer. The composer uses a conventional single-phase method and the three-phase composition process to select concrete services for the abstract service chain.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computer Security

سال: 2012

ISSN: 1875-8924,0926-227X

DOI: 10.3233/jcs-2011-0430