Aniketos Service Composition Framework: Analysing and Ranking of Secure Services

By Achim D. Brucker, Francesco Malmignati, Madjid Merabti, Qi Shi, and Bo Zhou.

Modern applications are inherently heterogeneous: they are built by composing loosely coupled services that are, usually, offered and operated by different service providers. While this approach increases the flexibility of the composed applications, it makes the implementation of security and trustworthiness requirements much more difficult. Therefore there is a need for new approaches that integrate security requirements right from the beginning while composing service-based applications, in order to ensure security and trustworthiness.

In this chapter, we present a framework for secure service composition using a model-based approach for specifying, building, and executing composed services. As a unique feature, this framework integrates security requirements as a first class citizen and, thus, avoids the ``security as an afterthought” paradigm.

Keywords:
Secure Service Composition, BPMN, Service Modelling, Service Availability

Please cite this work as follows:
A. D. Brucker, F. Malmignati, M. Merabti, Q. Shi, and B. Zhou, “Aniketos service composition framework: Analysing and ranking of secure services,” in Secure and trustworthy service composition: The aniketos approach, A. D. Brucker, F. Dalpiaz, P. Giorgini, P. H. Meland, and E. Rios, Eds. Heidelberg: Springer-Verlag, 2014, pp. 121–135. doi: 10.1007/978-3-319-13518-2_9. Author copy: https://logicalhacking.com/publications/brucker.ea-aniketos-scf-2014/

BibTeX
@InCollection{ brucker.ea:aniketos-scf:2014,
  author    = {Achim D. Brucker and Francesco Malmignati and Madjid Merabti
               and Qi Shi and Bo Zhou},
  title     = {Aniketos Service Composition Framework: Analysing and Ranking
               of Secure Services},
  areas     = {security, software},
  editor    = {Achim D. Brucker and Fabiano Dalpiaz and Paolo Giorgini and
               Per H{\aa}kon Meland and Erkuden {Rios}},
  booktitle = {Secure and Trustworthy Service Composition: The Aniketos
               Approach},
  publisher = {Springer-Verlag },
  address   = {Heidelberg },
  series    = {Lecture Notes in Computer Science : State of the Art
               Surveys},
  number    = {8900},
  doi       = {10.1007/978-3-319-13518-2_9},
  isbn      = {978-3-319-13517-5},
  year      = {2014},
  pages     = {121--135},
  keywords  = {Secure Service Composition, BPMN, Service Modelling, Service
               Availability},
  abstract  = {Modern applications are inherently heterogeneous: they are
               built by composing loosely coupled services that are, usually,
               offered and operated by different service providers. While
               this approach increases the flexibility of the composed
               applications, it makes the implementation of security and
               trustworthiness requirements much more difficult. Therefore
               there is a need for new approaches that integrate security
               requirements right from the beginning while composing
               service-based applications, in order to ensure security and
               trustworthiness.
               
               In this chapter, we present a framework for secure service
               composition using a model-based approach for specifying,
               building, and executing composed services. As a unique
               feature, this framework integrates security requirements as a
               first class citizen and, thus, avoids the ``security as an
               afterthought'' paradigm.},
  note      = {Author copy: \url{https://logicalhacking.com/publications/brucker.ea-aniketos-scf-2014/}},
  pdf       = {https://logicalhacking.com/publications/brucker.ea-aniketos-scf-2014/brucker.ea-aniketos-scf-2014.pdf},
}