Discovering Secure Service Compositions
نویسندگان
چکیده
Security is an important concern for service based systems, i.e., systems that are composed of autonomous and distributed software services. This is because the overall security of such systems depends on the security of the individual services they deploy and, hence, it is difficult to assess especially in cases where the latter services must be discovered and composed dynamically. This paper presents a novel approach for discovering secure compositions of software services. This approach is based on secure service orchestration patterns, which have been proven to provide certain security properties and can, therefore, be used to generate service compositions that are guaranteed to satisfy these properties by construction. The paper lays the foundations of the secure service orchestration patterns, and presents an algorithm that uses the patterns to generate secure service compositions and a tool realising our entire approach.
منابع مشابه
A Prototype for Discovering Compositions of Semantic Web Services
Semantic Web services provide semantically enhanced service descriptions which allow the development of automated service discovery and composition. Yet, an efficient semantic-based service discovery remains a major open challenge towards a wide acceptance of semantic Web services. In this paper we present a fully-automated matchmaking system for discovering sets of OWL-S Web services capable o...
متن کاملDesigning Secure Service Workflows in BPEL
This paper presents an approach that we have developed to support the design of secure service based applications in BPEL. The approach is based on the use of secure service composition patterns, which are proven to preserve composition level security properties if the services that are composed according to the pattern satisfy other properties individually. The secure service composition patte...
متن کاملFlexible Aspect-Based Service Adaptation for Accountability Properties in the Cloud1
Accountability properties, i.e., security and privacy properties for trustworthy data stewardship, are becoming increasingly important for Cloud applications. Frequently, they have to be enforced on large-scale service-based applications. In this paper we argue that real-world service infrastructures are best modeled in terms of three abstraction levels and that (partially invasive) adaptations...
متن کاملMultimedia Access Control Using RDF Metadata
The Synchronized Multimedia Integration Language (SMIL) [Aya01] is an W3C [W3C03] specification for authoring multimedia documents. Although SMIL has XML like syntactic constructs, unlike XML, SMIL compositions have an intended interpretation stemming from intuitive notions of playing out many media streams relative to each other. Thus, more than one SMIL syntactic expression can represent a mu...
متن کاملPosition Paper : Formal Methods for Developing Adaptable , Secure , Situation - aware Service - oriented ( � ) Architectures
In this position paper, we are concerned with formal methods for developing agent-based, situation-aware, secure, survivable architectures for on-demand discovery and composition of web services. In particular, we describe the development of an adaptable, situation-aware, secure architecture that provides for proofs that guarantee the consistency of service level agreements between service prov...
متن کامل