pdfreaders.org

A Framework for Secure Service Composition

Achim D. Brucker, Francesco Malmignati, Madjid Merabti, Qi Shi und Bo Zhou

Cover for brucker.ea:framework:2013.Modern applications are inherently heterogeneous: they are built by composing loosely coupled services that are, usually, offered and operated by different service providers. While this approach increases the flexibility of the composed applications, it makes the implementation of security and trustworthiness requirements much more difficult. As the requirements for security and trustworthiness, in nearly all sectors, are increasing dramatically, there is a need for new approaches that integrate security requirements right from the beginning while composing service-based applications.

In this paper, we present a framework for secure service composition using a model-based approach for specifying, building, and executing composed services. As a unique feature, this framework integrates security requirements as a first class citizen and, thus, avoids the "security as an afterthought" paradigm.

Schlüsselwörter: secure service composition, BPMN, service modelling, service availability
Kategorien: ,
Dokumente: (Artikel als PDF Datei) (Folien) (Handout)

QR Code for brucker.ea:framework:2013.Bitte zitieren sie diesen Artikel wie folgt:
Achim D. Brucker, Francesco Malmignati, Madjid Merabti, Qi Shi und Bo Zhou. A Framework for Secure Service Composition. In International Conference on Information Privacy, Security, Risk and Trust (PASSAT), pages 647-652, IEEE Computer Society, 2013.
Schlüsselwörter: secure service composition, BPMN, service modelling, service availability
(Artikel als PDF Datei) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1109/SocialCom.2013.97) (Share article on LinkedIn. Share article on CiteULike.)

BibTeX
@InCollection{ brucker.ea:framework:2013,
abstract = {Modern applications are inherently heterogeneous: they are built by composing loosely coupled services that are, usually, offered and operated by different service providers. While this approach increases the flexibility of the composed applications, it makes the implementation of security and trustworthiness requirements much more difficult. As the requirements for security and trustworthiness, in nearly all sectors, are increasing dramatically, there is a need for new approaches that integrate security requirements right from the beginning while composing service-based applications.\\\\In this paper, we present a framework for secure service composition using a model-based approach for specifying, building, and executing composed services. As a unique feature, this framework integrates security requirements as a first class citizen and, thus, avoids the ``security as an afterthought'' paradigm.},
address = {Los Alamitos, CA, USA},
author = {Achim D. Brucker and Francesco Malmignati and Madjid Merabti and Qi Shi and Bo Zhou},
booktitle = {International Conference on Information Privacy, Security, Risk and Trust (PASSAT)},
doi = {10.1109/SocialCom.2013.97},
ieee_booktitle = {International Conference on Social Computing (SocialCom)},
keywords = {secure service composition, BPMN, service modelling, service availability},
language = {USenglish},
pages = {647--652},
pdf = {https://www.brucker.ch/bibliography/download/2013/brucker.ea-framework-2013.pdf},
publisher = {IEEE Computer Society},
talk = {talk:brucker.ea:framework:2013},
title = {A Framework for Secure Service Composition},
url = {https://www.brucker.ch/bibliography/abstract/brucker.ea-framework-2013},
year = {2013},
}