The Aniketos Service Composition Framework: Analysing and ranking of secure services

被引:1
|
作者
Brucker, Achim D. [1 ]
Malmignati, Francesco [2 ]
Merabti, Madjid [3 ]
Shi, Qi [3 ]
Zhou, Bo [3 ]
机构
[1] SAP SE, Vincenz-Priessnitz-Str. 1, Karlsruhe,76131, Germany
[2] Selex ES S.P.A, A Finmeccanica Company, Italy
[3] Liverpool John Moores University, Liverpool, United Kingdom
关键词
Network security - Cryptography;
D O I
10.1007/978-3-319-13518-2_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern applications are inherently heterogeneous: they are built by composing loosely coupled services that are, usually, offered and operated by different service providers.While this approach increases the flexibility of the composed applications, it makes the implementation of security and trustworthiness requirements much more difficult. Therefore there is a need for new approaches that integrate security requirements right from the beginning while composing service-based applications, in order to ensure security and trustworthiness. In this chapter, we present a framework for secure service composition using a model-based approach for specifying, building, and executing composed services. As a unique feature, this framework integrates security requirements as a first class citizen and, thus, avoids the security as an afterthought paradigm. © Springer International Publishing Switzerland 2014.
引用
收藏
页码:121 / 135
相关论文
共 50 条
  • [1] Secure and Trustworthy Service Composition: The Aniketos Approach
    Brucker, Achim D.
    Dalpiaz, Fabiano
    Giorgini, Paolo
    Meland, Per HåKon
    Rios, Erkuden
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8900
  • [2] A Framework for Secure Service Composition
    Brucker, Achim D.
    Malmignati, Francesco
    Merabti, Madjid
    Shi, Qi
    Zhou, Bo
    2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, : 647 - 652
  • [3] A novel formal framework for secure dynamic services composition
    Xu, Dong-Hong
    Qi, Yong
    Hou, Di
    Wang, Gong-Zhen
    Chen, Ying
    2008 IEEE 8TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2008, : 694 - +
  • [4] Monitoring threats to composite services within the aniketos run-time framework
    Lempereur, Brett
    Ayed, Dhouha
    Asim, Muhammad
    Merabti, Madjid
    Shi, Qi
    Lempereur, Brett (b.lempereur@ljmu.ac.uk), 1600, Springer Verlag (8900): : 173 - 191
  • [5] A Compose Language-based Framework for Secure Service Composition
    Zhou, Bo
    Llewellyn-Jones, David
    Shi, Qi
    Asim, Muhammad
    Merabti, Madjid
    Lamb, David
    2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 195 - 202
  • [6] Me-services: A framework for secure & personalized discovery, composition and management of services in pervasive environments
    Joshi, A
    Finin, T
    Yesha, Y
    WEB SERVICES, E-BUSINESS, AND THE SEMANTIC WEB, 2002, 2512 : 248 - 259
  • [7] Modelling, validating, and ranking of secure service compositions
    Brucker, Achim D.
    Zhou, Bo
    Malmignati, Francesco
    Shi, Qi
    Merabti, Madjid
    SOFTWARE-PRACTICE & EXPERIENCE, 2017, 47 (12): : 1923 - 1943
  • [8] On the Synthesis of Secure Services Composition
    1600, Springer Verlag (8431):
  • [9] A framework for ranking of cloud computing services
    Garg, Saurabh Kumar
    Versteeg, Steve
    Buyya, Rajkumar
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (04): : 1012 - 1023
  • [10] A Framework for Ranking Cloud Security Services
    Taha, Ahmed
    Trapero, Ruben
    Luna, Jesus
    Suri, Neeraj
    2017 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC), 2017, : 322 - 329