Runtime Enforcement of Web Service Message Contracts with Data
نویسندگان
چکیده
منابع مشابه
Runtime Enforcement with Partial Control
This study carries forward the line of enquiry that seeks to characterize precisely which security policies are enforceable by runtime monitors. In this regard, Basin et al. recently refined the structure that helps distinguish between those actions that the monitor can potentially suppress or insert in the execution, from those that the monitor can only observe. In this paper, we generalize th...
متن کاملA Theory of Runtime Enforcement, with Results
This paper presents a theory of runtime enforcement based on mechanism models called MRAs (Mandatory Results Automata). MRAs can monitor and transform security-relevant actions and their results. Because previous work could not model monitors transforming results, MRAs capture realistic behaviors outside the scope of previous models. MRAs also have a simple but realistic operational semantics t...
متن کاملSuperContra: Cross-Language, Cross-Runtime Lightweight Contracts As a Service
Despite the potential of Design-by-Contract (DbC) for increasing the reliability and robustness of software, it has to date experienced only limited use. One reason for this, is that each DbC solution targets a single language (or language run-time) and thus employs different syntax and implementations for specifying contracts for each. Given that modern applications increasingly employ multipl...
متن کاملSemi-Automated Management of Web Service Contracts
Service-oriented computing as a concept for providing interoperability and flexibility within heterogeneous environments has gained much attention within the last few years. Dynamically integrating external Web services into enterprise applications requires automatic contracting between service requestors and providers and automatic contract monitoring. This paper suggests a semi-automatic appr...
متن کاملCompositional Runtime Enforcement
Runtime enforcement is a methodology used to enforce that the output of a running system satisfies a desired property. Given a property, an enforcement monitor modifies an (untrusted) sequence of events into a sequence that complies to that property. In practice, we may have not one, but many properties to enforce. Moreover, new properties may arise as new capabilities are added to the system. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Services Computing
سال: 2012
ISSN: 1939-1374
DOI: 10.1109/tsc.2011.10