Provably Secure Execution of Composed Semantic Web Services
نویسندگان
چکیده
In this paper, we present an approach to solve the problem of secure execution of semantic web service composition plans. The integrated components of this approach include our OWL-S service matchmaker, OWLS-MX, the service composition planner, OWLS-XPlan, and the security checker module for formally verifying the compliance of the created composition plan to be executed with given data and service security policies using type-based information flow analysis.
منابع مشابه
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملFormal Enforcement of Security Policies on Choreographed Services
Abstract. Web services are software systems that support distributed applications composed of independent processes which communicate by message passing. To realize the full potential of web services, we need to compose existent web services in order to get more functionalities. However the composition of web services should be secure. In this paper we propose an automatic formal approach to mo...
متن کاملA Platform for Discovery and Execution of Semantic Web Services Compositions
Semantic descriptions provide more accurate information related to operations supported by Web services, enabling their dynamic discovery and execution without human intervention. Furthermore, semantic descriptions allow Web services to be automatically combined by using discovery mechanisms able to identify composed services. These compositions can also be described and published as if they we...
متن کاملContext-aware Secure Service Composition Planning and Execution on E-Health Environments
Emergency Health-Care based scenarios provide the motivation to develop supporting technologies for dealing with situations where people need medical assistance because of a sudden disease or emergency. The innovative combination of intelligent agent technology, semantic Web services, peer-to-peer, and mobile computing for intelligent peer-to-peer mobile service environments is the corner stone...
متن کاملArtemia: a family of provably secure authenticated encryption schemes
Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006