Verification of Privacy Timed Properties in Web Service Protocols

被引:5
|
作者
Mokhtari, K. [1 ]
Benbernou, S. [1 ]
Said, M. [1 ]
Coquery, E. [1 ]
Hacid, M. S. [1 ]
Leymann, F. [2 ]
机构
[1] Univ Lyon 1, LIRIS, CNRS, UMR 5205, Lyon, France
[2] Univ Stuttgart, IAAS, D-70569 Stuttgart, Germany
关键词
D O I
10.1109/SCC.2008.154
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this work we propose an approach for verifying privacy timed-related properties of web service protocol. While in [2] the addressed problem in business protocols is focused on the analysis and management of functional requirements that support rich timing constraints, our approach extends the previous results to capture the timed behavior of privacy constraints. Hence, we provide a model called Timed Private Business Protocol TPBP. Next, we emphasize the timed properties related to privacy in TPBP. Finally, we present the different types of timed property verification to achieve upon the timed private business protocol.
引用
收藏
页码:593 / +
页数:2
相关论文
共 50 条
  • [41] Compatibility verification for web service choreography
    Foster, H
    Uchitel, S
    Magee, J
    Kramer, J
    IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, 2004, : 738 - 741
  • [42] A fast algebraic Web verification service
    Alpuente, M.
    Ballis, D.
    Falaschi, M.
    Ojeda, P.
    Romero, D.
    WEB REASONING AND RULE SYSTEMS, PROCEEDINGS, 2007, 4524 : 229 - +
  • [43] SOME PROPERTIES OF TIMED TOKEN MEDIUM ACCESS PROTOCOLS
    VALENZANO, A
    MONTUSCHI, P
    CIMINIERA, L
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1990, 16 (08) : 858 - 869
  • [44] Toward a better Interoperability of Enterprise Information Systems: A CPNs and Timed CPNs -based Web Service Interoperability Verification in a Choreography
    Benabdelhafid, Maya Souilah
    Boufaida, Mahmoud
    CENTERIS 2014 - CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS / PROJMAN 2014 - INTERNATIONAL CONFERENCE ON PROJECT MANAGEMENT / HCIST 2014 - INTERNATIONAL CONFERENCE ON HEALTH AND SOCIAL CARE INFORMATION SYSTEMS AND TECHNOLOGIES, 2014, 16 : 269 - 278
  • [45] ASEHA: A framework for modelling and verification of Web Services protocols
    Ramsokul, Pemadeep
    Sowmya, Arcot
    SEFM 2006: FOURTH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND FORMAL METHODS, PROCEEDINGS, 2006, : 196 - +
  • [46] An Investigation of Privacy Protocols in Location-Based Service
    Williams, Crystal
    Chi, Hongmei
    PROCEEDINGS OF THE 2015 INFORMATION SECURITY CURRICULUM DEVELOPMENT CONFERENCE, 2015,
  • [47] Web Service Composition Verification of Safety Properties: an Approach Based on Predicate Abstraction
    Wang Yuying
    Chen Ping
    MATERIALS PROCESSING AND MANUFACTURING III, PTS 1-4, 2013, 753-755 : 2892 - 2899
  • [48] Ontological Modeling of Web Service Interaction Protocols
    Zhi, Fang
    Liao Lejian
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 5438 - 5443
  • [49] Representing, analysing and managing Web service protocols
    Benatallah, Boualem
    Casati, Fabio
    Toumani, Farouk
    DATA & KNOWLEDGE ENGINEERING, 2006, 58 (03) : 327 - 357
  • [50] Analysis and Verification of Service Interaction Protocols - A Brief Survey -
    Salaun, Gwen
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2010, (35): : 75 - 86