City Research Online

Generating Secure Service Compositions

Pino, L., Spanoudakis, G., Fuchs, A. & Guergens, S. (2015). Generating Secure Service Compositions. Lecture Notes in Computer Science, 512, pp. 81-99. doi: 10.1007/978-3-319-25414-2_6

Abstract

Ensuring that the compositions of services that constitute service-based systems satisfy given security properties is a key prerequisite for the adoption of the service oriented computing paradigm. In this paper, we address this issue using a novel approach that guarantees service composition security by virtue of the generation of compositions. Our approach generates service compositions that are guaranteed to satisfy security properties based on secure service orchestration (SESO) patterns. These patterns express primitive (e.g., sequential, parallel) service orchestrations, which are proven to have certain global security properties if the individual services participating in them have themselves other security properties. The paper shows how SESO patterns can be constructed and gives examples of proofs for such patterns. It also presents the process of using SESO patterns to generate secure service compositions and presents the results of an initial experimental evaluation of the approach.

Publication Type: Article
Additional Information: The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-25414-2_6
Publisher Keywords: Software services, Secure service compositions, Security certificates
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Departments: School of Science & Technology > Computer Science
SWORD Depositor:
[thumbnail of camera_ready (1).pdf]
Preview
Text - Accepted Version
Download (1MB) | Preview

Export

Add to AnyAdd to TwitterAdd to FacebookAdd to LinkedinAdd to PinterestAdd to Email

Downloads

Downloads per month over past year

View more statistics

Actions (login required)

Admin Login Admin Login