Planning and verifying service composition

نویسندگان

  • Massimo Bartoletti
  • Pierpaolo Degano
  • Gian Luigi Ferrari
چکیده

A static approach is proposed to study secure composition of services. We extend the λ-calculus with primitives for selecting and invoking services that respect given security requirements. Security-critical code is enclosed in policy framings with a possibly nested, local scope. Policy framings enforce safety and liveness properties. The actual run-time behaviour of services is over-approximated by a type and effect system. Types are standard, and effects include the actions with possible security concerns — as well as information about which services may be invoked at run-time. An approximation is model-checked to verify policy framings within their scopes. This allows for removing any run-time execution monitor, and for determining the plans driving the selection of those services that match the security requirements on demand.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Fluent Calculus Approach to Automatic Web Service Composition

Web service composition is mandatory when complex functional requirements cannot be satisfied by a single Web service. Because of the exponential growth of available Web services, their automatic discovery and composition are highly desirable tasks. This paper presents a new approach for automatic Web service composition based on the formalism of Fluent Calculus using semantic service descripti...

متن کامل

Planning with Workflows - An Emerging Paradigm for Web Service Composition

In a previous work, we had analyzed the gaps in the prevalent approaches (i.e., Semantic Web Services and WSDLdescribed Web Services) for the problems of modeling, composing, executing, and verifying Web services, and derived challenges for the AI planning community. The challenges were in representation of complex actions, handling of richly typed messages, dynamic object creation and specific...

متن کامل

Petri Net based approach for merging ontologies in web service composition scenario

Ontologies are being used for construction of semantically rich service descriptions. In case of Web service composition, techniques for planning, composing, editing, reasoning and analyzing of these descriptions are required. It’s necessary to resolve semantic interoperability between services to achieve Web services coordination and collaboration. Matchmaking and merging of service descriptio...

متن کامل

Web Service Composition - Current Solutions and Open Problems

Composition of Web services has received much interest to support business-to-business or enterprise application integration. On the one side, the business world has developed a number of XML-based standards to formalize the specification of Web services, their flow composition and execution. This approach is primarily syntactical: Web service interfaces are like remote procedure call and the i...

متن کامل

Information Flow Analysis Based Security Checking of Health Service Composition Plans

In this paper, we present an approach to solve the problem of provably secure execution of semantic web service composition plans. The integrated components of this approach include our OWL-S service matchmaker, OWLSMX, the service composition planner, OWLS-XPlan, and the security checker module for formally verifying the compliance of the created composition plan to be executed with given data...

متن کامل

Optimizing Web Service Composition While Enforcing Regulations

To direct automated Web service composition, it is compelling to provide a template, workflow or scaffolding that dictates the ways in which services can be composed. In this paper we present an approach to Web service composition that builds on work using AI planning, and more specifically Hierarchical Task Networks (HTNs), for Web service composition. A significant advantage of our approach i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Journal of Computer Security

دوره 17  شماره 

صفحات  -

تاریخ انتشار 2009