Verification of Privacy Timed Properties in Web Service Protocols

被引:5
|
作者
Mokhtari, K. [1 ]
Benbernou, S. [1 ]
Said, M. [1 ]
Coquery, E. [1 ]
Hacid, M. S. [1 ]
Leymann, F. [2 ]
机构
[1] Univ Lyon 1, LIRIS, CNRS, UMR 5205, Lyon, France
[2] Univ Stuttgart, IAAS, D-70569 Stuttgart, Germany
关键词
D O I
10.1109/SCC.2008.154
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this work we propose an approach for verifying privacy timed-related properties of web service protocol. While in [2] the addressed problem in business protocols is focused on the analysis and management of functional requirements that support rich timing constraints, our approach extends the previous results to capture the timed behavior of privacy constraints. Hence, we provide a model called Timed Private Business Protocol TPBP. Next, we emphasize the timed properties related to privacy in TPBP. Finally, we present the different types of timed property verification to achieve upon the timed private business protocol.
引用
收藏
页码:593 / +
页数:2
相关论文
共 50 条
  • [1] Representation, verification, and computation of timed properties in Web service compositions
    Kazhamiakin, Raman
    Pandya, Paritosh
    Pistore, Marco
    ICWS 2006: IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, 2006, : 497 - +
  • [2] Verification for commitment-based web service protocols
    Fang, Z. (fangz@bit.edu.cn), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (07):
  • [3] Conceptual modeling of privacy-aware Web service protocols
    Hamadi, Rachid
    Paik, Hye-Young
    Benatallah, Boualem
    ADVANCED INFORMATION SYSTEMS ENGINEERING, PROCEEDINGS, 2007, 4495 : 233 - +
  • [4] Fine-grained compatibility and replaceability analysis of timed web service protocols
    Ponge, Julien
    Benatallah, Boualem
    Casati, Fabio
    Toumani, Farouk
    CONCEPTUAL MODELING - ER 2007, PROCEEDINGS, 2007, 4801 : 599 - +
  • [5] TIMED PRIVACY-AWARE BUSINESS PROTOCOLS
    Mokhtari-Aslaoui, Karima
    Benbernou, Salima
    Sahri, Soror
    Andrikopoulos, Vasilios
    Leymann, Frank
    Hacid, Mohand-Said
    INTERNATIONAL JOURNAL OF COOPERATIVE INFORMATION SYSTEMS, 2012, 21 (02) : 85 - 109
  • [6] Tidy: Symbolic Verification of Timed Cryptographic Protocols
    Barthe, Gilles
    Dal Lago, Ugo
    Malavolta, Giulio
    Rakotonirina, Itsaka
    PROCEEDINGS OF THE 2022 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2022, 2022, : 263 - 276
  • [7] A Public-View Approach to Timed Properties Verification for B2B Web Service Compositions
    Song, Wei
    Ma, Xiaoxing
    Cheung, S. C.
    Dou, Wanchun
    Lue, Jian
    2009 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, 2009, : 427 - +
  • [8] Analysis and Applications of Timed Service Protocols
    Ponge, Julien
    Benatallah, Boualem
    Casati, Fabio
    Toumani, Farouk
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2010, 19 (04)
  • [9] Verification of Web Services with Timed Automata
    Diaz, Gregorio
    Pardo, Juan-Jose
    Cambronero, Maria-Emilia
    Valero, Valentin
    Cuartero, Fernando
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 157 (02) : 19 - 34
  • [10] Modeling and Verification of Privacy Enhancing Protocols
    Suriadi, Suriadi
    Ouyang, Chun
    Smith, Jason
    Foo, Ernest
    FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2009, 5885 : 127 - 146