Skip to main content

2014 | OriginalPaper | Buchkapitel

8. A Heuristic Approach for Secure Service Composition Adaptation

verfasst von : Bo Zhou, David Llewellyn-Jones, David Lamb, Muhammad Asim, Qi Shi, Madjid Merabti

Erschienen in: Cyberpatterns

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Secure adaptation of service composition is crucial for service-oriented applications. An effective adaptation method must improve a composition’s adherence to specified behaviour, performance and security guarantees at reasonable cost in terms of computing complexity and time consumption. This chapter discusses current techniques that have been developed to help achieve secure service composition. Based on security verification results, which have been categorised into four patterns in this chapter, a simple heuristics-based adaptation strategy is proposed. This proposal aims at more accurate yet relatively fast secure service adaptation strategy. In order to make direct comparisons of different services, a simple quantification method is also introduced.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
7.
Zurück zum Zitat Miao W, Liu S. Service-oriented modeling using the SOFL formal engineering method. IEEE Asia-Pacific services computing conference. IEEE CS press, Jeju; 7–11 Dec 2009. doi:10.1109/APSCC.2009.5394123. p. 187–192 Miao W, Liu S. Service-oriented modeling using the SOFL formal engineering method. IEEE Asia-Pacific services computing conference. IEEE CS press, Jeju; 7–11 Dec 2009. doi:10.​1109/​APSCC.​2009.​5394123. p. 187–192
8.
Zurück zum Zitat Dragoni N, et al. Security-by-contract (SxC) for software and services of mobile systems. In: Di Nitto et al., editors. At your service: service-oriented computing from an EU perspective. Cambridge: MIT Press; 2009. p. 429–454. Dragoni N, et al. Security-by-contract (SxC) for software and services of mobile systems. In: Di Nitto et al., editors. At your service: service-oriented computing from an EU perspective. Cambridge: MIT Press; 2009. p. 429–454.
9.
Zurück zum Zitat Costa G, et al. Security-by-contract-with-trust for mobile devices. J Wirel Mob Netw Ubiquitous Comput Dependable Appl. 2010;1:75–91. Costa G, et al. Security-by-contract-with-trust for mobile devices. J Wirel Mob Netw Ubiquitous Comput Dependable Appl. 2010;1:75–91.
10.
Zurück zum Zitat Miao W, Liu S. A formal specification-based testing approach to accurate web service selection. IEEE Asia Pacific Services Computing Conference. IEEE CS Press, Jeju, Korea; 12–15 Dec 2011. p. 259–266. doi:10.1109/APSCC.2011.34. Miao W, Liu S. A formal specification-based testing approach to accurate web service selection. IEEE Asia Pacific Services Computing Conference. IEEE CS Press, Jeju, Korea; 12–15 Dec 2011. p. 259–266. doi:10.​1109/​APSCC.​2011.​34.
13.
Zurück zum Zitat Zhou B, Drew O, Arabo A, Llewellyn-Jones D, Kifayat K, Merabti M, Shi Q, Craddock R, Waller A, Jones G. System-of-systems boundary check in a public event scenario. 5th international conference on systems of systems engineering, winner of the conference best paper award, Loughborough, UK; June 2010. doi:10.1109/SYSOSE.2010.5544013. Zhou B, Drew O, Arabo A, Llewellyn-Jones D, Kifayat K, Merabti M, Shi Q, Craddock R, Waller A, Jones G. System-of-systems boundary check in a public event scenario. 5th international conference on systems of systems engineering, winner of the conference best paper award, Loughborough, UK; June 2010. doi:10.​1109/​SYSOSE.​2010.​5544013.
14.
Zurück zum Zitat Gritzalis S, Spinellis D. The cascade vulnerability problem: the detection problem and a simulated annealing approach to its correction. Microprocess Microsyst. 1998;21(10):621–8.CrossRef Gritzalis S, Spinellis D. The cascade vulnerability problem: the detection problem and a simulated annealing approach to its correction. Microprocess Microsyst. 1998;21(10):621–8.CrossRef
15.
Zurück zum Zitat Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M, Lamb D. Secure service composition adaptation based on simulated annealing. Proceedings of the 6th layered assurance workshop, annual computer security applications conference (ACSAC 2012), Orlando, Florida, USA; Dec 2012. p. 49–55. Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M, Lamb D. Secure service composition adaptation based on simulated annealing. Proceedings of the 6th layered assurance workshop, annual computer security applications conference (ACSAC 2012), Orlando, Florida, USA; Dec 2012. p. 49–55.
16.
Zurück zum Zitat Aktug I, Naliuka K. ConSpec—a formal language for policy specification. Electron Notes Theoret Comput Sci (ENTCS). 2008;197(1):45–58.CrossRefMathSciNet Aktug I, Naliuka K. ConSpec—a formal language for policy specification. Electron Notes Theoret Comput Sci (ENTCS). 2008;197(1):45–58.CrossRefMathSciNet
Metadaten
Titel
A Heuristic Approach for Secure Service Composition Adaptation
verfasst von
Bo Zhou
David Llewellyn-Jones
David Lamb
Muhammad Asim
Qi Shi
Madjid Merabti
Copyright-Jahr
2014
DOI
https://doi.org/10.1007/978-3-319-04447-7_8

Premium Partner