2010 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing 2010
DOI: 10.1109/synasc.2010.75
|View full text |Cite
|
Sign up to set email alerts
|

Automated Validation of Security-Sensitive Web Services Specified in BPEL and RBAC

Abstract: We formalize automated analysis techniques for the validation of web services specified in BPEL and a RBAC variant tailored to BPEL. The idea is to use decidable fragments of firstorder logic to describe the state space of a certain class of web services and then use state-of-the-art SMT solvers to handle their reachability problems. To assess the practical viability of our approach, we have developed a prototype tool implementing our techniques and applied it to a digital contract signing service inspired by … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
2
2
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…A method to integrate a Satisfiability Modulo Theories (SMT) solver into Petri net–based business process verification is sketched in the work of Monakova et al However, this method is limited to acyclic processes since its termination cannot be guaranteed. Another approach using an SMT solver is presented in the works of Barletta et al and Calvi et al, where processes are modeled in terms of vector addition systems, which then can be verified with respect to reachability. Again, to ensure decidability, only acyclic processes are considered.…”
Section: State Of the Artmentioning
confidence: 99%
“…A method to integrate a Satisfiability Modulo Theories (SMT) solver into Petri net–based business process verification is sketched in the work of Monakova et al However, this method is limited to acyclic processes since its termination cannot be guaranteed. Another approach using an SMT solver is presented in the works of Barletta et al and Calvi et al, where processes are modeled in terms of vector addition systems, which then can be verified with respect to reachability. Again, to ensure decidability, only acyclic processes are considered.…”
Section: State Of the Artmentioning
confidence: 99%
“…We plan to perform a more extensive experimental analysis as part of future work. We have already started doing this in [18], by extending WSSMT with the capability of using BPEL files for the WF level and the RBAC-WS-BPEL proposed in [43] for the PM level. This is done by generalizing the encoding for Petri nets and RBAC discussed in Sect.…”
Section: Pragmatics Of Reasoning Modulo Theoriesmentioning
confidence: 99%
“…The details about how this is done depend on the application domain and are beyond the scope of the paper. The interested reader is pointed, e.g., to [18] for a discussion of the combination of services specified by BPEL and a variant of RBAC tailored to BPEL. In the rest of this section, we assume that T SOA has been derived from the component background theories T 1 SOA , .…”
Section: An Application To Composition Of Servicesmentioning
confidence: 99%
“…The modification of BPEL2oWFN that we did was simple since the tool is capable of computing a Petri net specifying the control-flow of the (composed) service and there is a well-known connection between Petri nets and Vector Addition Systems (VASs), which can be seen as a particular class of guarded assignment systems for the WF level. The details of this relationship are omitted here for lack of space but can be found in, e.g., [23], [24]. The reader may wonder why we took this indirect way to obtain a first abstract specification of DCS: the answer is that the (composed) service was big and thus was very difficult to write from scratch.…”
Section: B Digital Contract Signingmentioning
confidence: 99%
“…Along the same lines, we have added Separation of Duties constraints (e.g., the user signing the contract should not be the same as the one checking the validity of the signature on the contract) and Bound of Duties constraints (e.g., the users signing the contract should be same that have agreed on the conditions of the contract) authorization constraints. Again, further details can be found in [24].…”
Section: B Digital Contract Signingmentioning
confidence: 99%