2015
DOI: 10.1007/978-3-319-25414-2_6
|View full text |Cite
|
Sign up to set email alerts
|

Generating Secure Service Compositions

Abstract: This is the accepted version of the paper.This version of the publication may differ from the final published version. Abstract. Ensuring that the compositions of services that constitute service-based systems satisfy given security properties is a key prerequisite for the adoption of the service oriented computing paradigm. In this paper, we address this issue using a novel approach that guarantees service composition security by virtue of the generation of compositions. Our approach generates service composi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
2
2
1

Relationship

4
1

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 22 publications
0
8
0
Order By: Relevance
“…The work we present in this paper extends our previous work described in [24] [25][26] [28]. The work in [24] [25] presented an initial proof-of-concept realisation of our approach for pattern-driven generation of secure service compositions without, however, addressing verification.…”
Section: Introductionmentioning
confidence: 71%
See 2 more Smart Citations
“…The work we present in this paper extends our previous work described in [24] [25][26] [28]. The work in [24] [25] presented an initial proof-of-concept realisation of our approach for pattern-driven generation of secure service compositions without, however, addressing verification.…”
Section: Introductionmentioning
confidence: 71%
“…In [26], we presented the initial version of the algorithm for inferring service level from workflow level security properties, and provided an overview of how it could support workflow verification/adaptation without any algorithmic details for these processes. In [28], we presented formal proofs of some SCO patterns (e.g., integrity) and an initial prototype of our approach focusing on security-driven service discovery.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The encoding of such dependencies enables: (i) the verification that a smart object orchestration satisfies certain SPDI properties, and (ii) the generation (and adaptation) of orchestrations in ways that are guaranteed to satisfy required SPDI properties. The SEMIoTICS approach to patterns is inspired from similar pattern-based approaches used in service-oriented systems [52,53], cyber physical systems [54] and networks [55,56]. • Multi-layered Embedded Intelligence: Effective adaptation and autonomic behaviour at field (edge) and infrastructure (backend) layers depends critically on intelligent analysis and learning the circumstances where adaptation actions did not work as expected.…”
Section: Visionmentioning
confidence: 99%
“…Even though patterns have been mainly applied on software development, the method can be used satisfactorily for the component composition of systems such as CPS [14]. Security patterns, for service compositions based on enabling reasoning engines such as Drools, are described in [15], [16]. In our approach instead of service composition, the concept of component compositions is proposed.…”
Section: Related Workmentioning
confidence: 99%