City Research Online

Constructing secure service compositions with patterns

Pino, L. & Spanoudakis, G. (2012). Constructing secure service compositions with patterns. Paper presented at the 2012 IEEE 8th World Congress on Services, SERVICES 2012, 24 -29 June 2012, Honolulu, Hawaii. doi: 10.1109/SERVICES.2012.61


In service based applications, it is often necessary to construct compositions of services in order to provide required functionality in cases where this is not possible through the use of a single service. Whilst creating service compositions, it is necessary to ensure not only that the functionality required of the composition is achieved but also that certain security properties are preserved. In this paper, we describe an approach to constructing secure service compositions. Our approach is based on the use of composition patterns and rules that determine the security properties that should be preserved by the individual services that constitute a composition in order to ensure that security properties of the overall composition are also satisfied. Our approach extends a framework developed to support the runtime service discovery.

Publication Type: Conference or Workshop Item (Paper)
Additional Information: © 2012 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. DOI: 10.1109/SERVICES.2012.61
Publisher Keywords: Software service security, secure service composition
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Departments: School of Science & Technology > Computer Science
Download (567kB) | Preview



Downloads per month over past year

View more statistics

Actions (login required)

Admin Login Admin Login