Test-Based Security Certification of Composite Services
نویسندگان
چکیده
منابع مشابه
Security Policy Monitoring of Composite Services
One important challenge the Aniketos platform has to address is the effective monitoring of services at runtime to ensure that services behave as promised. A service developer plays the role that is responsible for constructing service compositions and the service provider is responsible for offering them to consumers of the Aniketos platform. Typically, service consumers will have different ne...
متن کاملTowards Pattern-Based Reliability Certification of Services
On Service-Oriented Architectures (SOAs), the mechanism for run-time discovery and selection of services may conflict with the need to make sure that business process instances satisfy their reliability requirements. In this paper we describe a certification scheme based on machine-readable reliability certificates that will enable run-time negotiation. Service reliability is afforded by means ...
متن کاملSecurity and Trust in Composite Services
The wide variety of services and resources available over theInternet presents new opportunities to create value added, inter-organisational Composite Services (CSs) from multiple existing services.The resulting CS may involve close interaction between the constituentservices of participating organisations. In order to preserve theirautonomy and privacy, each organisation ne...
متن کاملMonitoring-Based Certification of Cloud Service Security
In this paper, we present a novel approach to cloud service security certification. This approach could be used to: (a) define and execute automatically certification models, which can continuously and incrementally acquire and analyse evidence regarding the provision of services on cloud infrastructures through continuous monitoring; (b) use this evidence to assess whether the provision is com...
متن کاملOn Estimating the Security Risks of Composite Software Services
With the rapid adoption of the Service Oriented Architecture (SOA), sophisticated software systems are increasingly built by composing coarse-grained service components offered by different organizations through standard web service interfaces. The ability to quantify end-to-end security risks of composite software services is extremely valuable to businesses that increasingly rely on web appli...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Transactions on the Web
سال: 2019
ISSN: 1559-1131,1559-114X
DOI: 10.1145/3267468