2018
DOI: 10.1007/978-3-319-91764-1_4
|View full text |Cite
|
Sign up to set email alerts
|

An End-to-End Security Model for Adaptive Service-Oriented Applications

Abstract: In this paper, we present E2SM, an End-to-End Security Model and a set of algorithms to protect data confidentiality in complex adaptive Serviceoriented applications SOA. Starting from initial and intuitive business security constraints' settings, E2SM synthesizes a complete security configuration that is formally verified. E2SM is adapted to dynamic security constraints' modifications and to services' architecture reconfiguration. Thanks to its compositional verification, only impacted services' security is r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
1
1
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 22 publications
(23 reference statements)
0
2
0
Order By: Relevance
“…In other words, this step checks that initial provided labels are not putting more constraints than the security provided by the other services. Note that in the short version of the paper [10], the bindings security checking is performed outside the algorithm. We find it more practical to have each process security verification locally handled within the same program rather than separating intra‐ and inter‐service verification in two separate steps.…”
Section: Security Configuration Synthesismentioning
confidence: 99%
See 1 more Smart Citation
“…In other words, this step checks that initial provided labels are not putting more constraints than the security provided by the other services. Note that in the short version of the paper [10], the bindings security checking is performed outside the algorithm. We find it more practical to have each process security verification locally handled within the same program rather than separating intra‐ and inter‐service verification in two separate steps.…”
Section: Security Configuration Synthesismentioning
confidence: 99%
“…E2SM allows the setting of data‐centric security policies that go beyond services boundaries. E2SM was introduced as part of a previous work [10]. In that work, a formal security model for end‐to‐end security configuration was presented.…”
Section: Introductionmentioning
confidence: 99%