Specification for security Orchestration

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Orchestration under Security Constraints

Automatic composition of web services is a challenging task. Many works have considered simplified automata models that abstract away from the structure of messages exchanged by the services. For the domain of secured services (using e.g. digital signing or timestamping) we propose a novel approach to automated composition of services based on their security policies. Given a community of servi...

متن کامل

Web service orchestration driven by formal specification

Abstr act. When set of basic web service is built, the next step is to create more complex one. A programmatic approach uses declarative language such as BPEL. This kind of representation is verbose and needs assistance for the creation of business process. We defined a generative strategy leading by formal specification. Because, web service composition languages use standard operators like se...

متن کامل

Bundle Security Protocol Specification

This document defines an Experimental Protocol for the Internet community. This document is a product of the Internet Research Task Force (IRTF). The IRTF publishes the results of Internet-related research and development activities. These results might not be suitable for deployment. This RFC represents the consensus of the Delay-Tolerant Networking Research Group of the Internet Research Task...

متن کامل

Security Specification and Verification

Formalizing security requirements has received a significant attention since the 70s. However, a general method for specifying security requirements is still missing. Especially, little work has been presented on specifying and verifying that a given application is a secure resource consumer. The purpose of this work is to set up a methodology for (1)specifying security requirements of service ...

متن کامل

ASPIRE: Iterative Specification Synthesis for Security

How to perform a systematic security analysis of complex applications is a challenging and open question. Approaches based on formal verification are impeded due to the lack of application specifications. To address this challenge, we propose a framework, called ASPIRE, that enables analysts to automatically synthesize specifications from examples such as application input-output examples and s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Procedia Engineering

سال: 2012

ISSN: 1877-7058

DOI: 10.1016/j.proeng.2012.06.053