A Framework for Secure Service Composition

被引:6
|
作者
Brucker, Achim D. [1 ]
Malmignati, Francesco [2 ]
Merabti, Madjid [3 ]
Shi, Qi [3 ]
Zhou, Bo [3 ]
机构
[1] SAP AG, Vincenz Priessnitz Str 1, D-76131 Karlsruhe, Germany
[2] Finmeccanica Co, Selex ES Spa, Rome, Italy
[3] Liverpool John Moores Univ, Liverpool, Merseyside, England
关键词
BUSINESS; REQUIREMENTS; SEMANTICS;
D O I
10.1109/SocialCom.2013.97
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern applications are inherently heterogeneous: they are built by composing loosely coupled services that are, usually, offered and operated by different service providers. While this approach increases the flexibility of the composed applications, it makes the implementation of security and trustworthiness requirements difficult. As the number of security requirements is increasing dramatically, there is a need for new approaches that integrate security requirements right from the beginning while composing service-based applications. In this paper, we present a framework for secure service composition using a model-based approach for specifying, building, and executing composed services. As a unique feature, this framework integrates security requirements as a first class citizen and, thus, avoids the "security as an afterthought" paradigm.
引用
收藏
页码:647 / 652
页数:6
相关论文
共 50 条
  • [1] The Aniketos Service Composition Framework: Analysing and ranking of secure services
    Brucker, Achim D.
    Malmignati, Francesco
    Merabti, Madjid
    Shi, Qi
    Zhou, Bo
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8900 : 121 - 135
  • [2] A Compose Language-based Framework for Secure Service Composition
    Zhou, Bo
    Llewellyn-Jones, David
    Shi, Qi
    Asim, Muhammad
    Merabti, Madjid
    Lamb, David
    2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 195 - 202
  • [3] Enforcing secure service composition
    Bartoletti, M
    Degano, P
    Ferrari, GL
    18th IEEE Computer Security Foundations Workshop, Proceedings, 2005, : 211 - 223
  • [4] Modular Plans for Secure Service Composition
    Costa, Gabriele
    Degano, Pierpaolo
    Martinelli, Fabio
    AUTOMATED REASONING FOR SECURITY PROTOCOL ANALYSIS AND ISSUES IN THE THEORY OF SECURITY, 2010, 6186 : 41 - +
  • [5] Modular plans for secure service composition
    Costa, Gabriele
    Degano, Pierpaolo
    Martinelli, Fabio
    JOURNAL OF COMPUTER SECURITY, 2012, 20 (01) : 81 - 117
  • [6] SECURE SERVICE COMPOSITION IN SENSOR WEB
    Yu, Genong
    Di, Liping
    2009 IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM, VOLS 1-5, 2009, : 3882 - 3885
  • [7] Secure service composition with information flow control in service clouds
    Xi, Ning
    Sun, Cong
    Ma, Jianfeng
    Shen, Yulong
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 49 : 142 - 148
  • [8] A Framework of Secure Computation as a Service in Decentralized Environment
    Pei, Xin
    Song, Wenpeng
    Cao, Juntao
    Zheng, Songsong
    Wu, Xiaochuan
    2022 SEVENTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING, FMEC, 2022, : 27 - 32
  • [9] Survey: Service composition framework
    Zeng, LZ
    Chung, JY
    THIRD INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE ENGINEERING: DIGITAL ENTERPRISES AND NONTRADITIONAL INDUSTRIALIZATION, 2003, : 758 - 762
  • [10] A framework for dynamic service composition
    Supadulchai, P
    Aagesen, FA
    SIXTH IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS MOBILE AND MULTIMEDIA NETWORKS, PROCEEDINGS, 2005, : 527 - 531