Trustable Remote Verification of Web Services
نویسنده
چکیده
Service Oriented Architectures currently provide little or no evidence that each remote component has been implemented correctly. This is a problem for businesses hoping to exploit the potential benefits of SOA. We present a technique called Trustable Remote Verification, which lets providers create behavioural guarantees of their web services. Our approach is flexible, using Extended Static Checking for verification and has the significant advantage of requiring no additional trusted third
منابع مشابه
A model for specification, composition and verification of access control policies and its application to web services
Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...
متن کاملWeb Service Choreography Verification Using Z Formal Specification
Web Service Choreography Description Language (WS-CDL) describes and orchestrates the services interactions among multiple participants. WS-CDL verification is essential since the interactions would lead to mismatches. Existing works verify the messages ordering, the flow of messages, and the expected results from collaborations. In this paper, we present a Z specification of WS-CDL. Besides ve...
متن کاملAn Analysis of Customer and Seller Verification In
Nowadays, E-commerce 2.0 is taking the conventional E-commerce place. The new Ecommerce infrastructure uses Web 2.0 technologies. It is based on user generated content. Each Internet user may sell or buy Products and services and pay their prices online in a dynamic website. With the expansion of Internet, the number of cons and frauds increased and trade for ordinary Internet users became inse...
متن کاملTOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones
Smartphones are increasingly being used to store personal information as well as to access sensitive data from the Internet and the cloud. Establishment of the identity of a user requesting information from smartphones is a prerequisite for secure systems in such scenarios. In the past, keystroke-based user identification has been successfully deployed on production-level mobile devices to miti...
متن کاملVerification of Web Service Flows with Model-Checking Techniques
Web service is an emerging software technology to use remote services in the Internet. As it becomes pervasive, some “language” to describe Web service flows is needed to combine existing services flexibly. The flow essentially describes distributed collaborations and is not easy to write and verify, while the fault that the flow description may contain can only be detected at runtime. The faul...
متن کامل