Constructing secure service compositions with patterns

Pino, L. & Spanoudakis, G. (2012). Constructing secure service compositions with patterns. Paper presented at the 2012 IEEE 8th World Congress on Services, SERVICES 2012, 24 -29 June 2012, Honolulu, Hawaii.

[img]
Preview
PDF
Download (567kB) | Preview

Abstract

In service based applications, it is often necessary to construct compositions of services in order to provide required functionality in cases where this is not possible through the use of a single service. Whilst creating service compositions, it is necessary to ensure not only that the functionality required of the composition is achieved but also that certain security properties are preserved. In this paper, we describe an approach to constructing secure service compositions. Our approach is based on the use of composition patterns and rules that determine the security properties that should be preserved by the individual services that constitute a composition in order to ensure that security properties of the overall composition are also satisfied. Our approach extends a framework developed to support the runtime service discovery.

Item Type: Conference or Workshop Item (Paper)
Additional Information: © 2012 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. DOI: 10.1109/SERVICES.2012.61
Uncontrolled Keywords: Software service security, secure service composition
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: School of Informatics > Department of Computing
URI: http://openaccess.city.ac.uk/id/eprint/2468

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics