2014
DOI: 10.1007/978-3-662-45391-9_48
|View full text |Cite
|
Sign up to set email alerts
|

Designing Secure Service Workflows in BPEL

Abstract: This is the accepted version of the paper.This version of the publication may differ from the final published version. Abstract. This paper presents an approach that we have developed to support the design of secure service based applications in BPEL. The approach is based on the use of secure service composition patterns, which are proven to preserve composition level security properties if the services that are composed according to the pattern satisfy other properties individually. The secure service compos… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…This, however, turned out to be inefficient for both specifying and applying patterns for secure service composition. In [26], we presented the initial version of the algorithm for inferring service level from workflow level security properties, and provided an overview of how it could support workflow verification/adaptation without any algorithmic details for these processes. In [28], we presented formal proofs of some SCO patterns (e.g., integrity) and an initial prototype of our approach focusing on security-driven service discovery.…”
Section: Introductionmentioning
confidence: 99%
“…This, however, turned out to be inefficient for both specifying and applying patterns for secure service composition. In [26], we presented the initial version of the algorithm for inferring service level from workflow level security properties, and provided an overview of how it could support workflow verification/adaptation without any algorithmic details for these processes. In [28], we presented formal proofs of some SCO patterns (e.g., integrity) and an initial prototype of our approach focusing on security-driven service discovery.…”
Section: Introductionmentioning
confidence: 99%
“…Even though patterns have been mainly applied on software development, the method can be used satisfactorily for the component composition of systems such as CPS [14]. Security patterns, for service compositions based on enabling reasoning engines such as Drools, are described in [15], [16]. In our approach instead of service composition, the concept of component compositions is proposed.…”
Section: Related Workmentioning
confidence: 99%