Generating Secure Service Compositions

Pino, L., Spanoudakis, G., Fuchs, A. & Guergens, S. (2015). Generating Secure Service Compositions. Lecture Notes in Computer Science, 512, pp. 81-99. doi: 10.1007/978-3-319-25414-2_6

[img]
Preview
Text - Accepted Version
Download (1MB) | Preview

Abstract

Ensuring that the compositions of services that constitute service-based systems satisfy given security properties is a key prerequisite for the adoption of the service oriented computing paradigm. In this paper, we address this issue using a novel approach that guarantees service composition security by virtue of the generation of compositions. Our approach generates service compositions that are guaranteed to satisfy security properties based on secure service orchestration (SESO) patterns. These patterns express primitive (e.g., sequential, parallel) service orchestrations, which are proven to have certain global security properties if the individual services participating in them have themselves other security properties. The paper shows how SESO patterns can be constructed and gives examples of proofs for such patterns. It also presents the process of using SESO patterns to generate secure service compositions and presents the results of an initial experimental evaluation of the approach.

Item Type: Article
Additional Information: The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-25414-2_6
Uncontrolled Keywords: Software services, Secure service compositions, Security certificates
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: School of Informatics > Department of Computing
URI: http://openaccess.city.ac.uk/id/eprint/15283

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics