2009
DOI: 10.1007/978-3-642-10383-4_27
|View full text |Cite
|
Sign up to set email alerts
|

Incorporating Security Requirements into Service Composition: From Modelling to Execution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
28
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 26 publications
(29 citation statements)
references
References 12 publications
0
28
0
Order By: Relevance
“…The Sec-MoSC tool [33] supports the addition of required security properties to BPMN processes [7] and the selection of default mechanisms for implementing them. The BPMN processes along with the selected mechanisms are transformed to BPEL and a security engine is used to realise the security mechanisms added to the process.…”
Section: Related Workmentioning
confidence: 99%
“…The Sec-MoSC tool [33] supports the addition of required security properties to BPMN processes [7] and the selection of default mechanisms for implementing them. The BPMN processes along with the selected mechanisms are transformed to BPEL and a security engine is used to realise the security mechanisms added to the process.…”
Section: Related Workmentioning
confidence: 99%
“…For example, work in [30] identified a collection of security requirements (such as data encryption, authentication of web services, and event logging) of service composition and present an approach called Sec-MoSC to incorporate the requirements into security mechanisms. The major advantage of this approach is that it is easily extensible.…”
Section: Related Workmentioning
confidence: 99%
“…The annotations are then used to discover appropriate services for the BPEL process, using an annotated registry. The Sec-MoSC (Security for Model-oriented Service Composition) tool [11] is an extension of the Eclipse BPMN Modeller that allows to design BPMN business processes and to add security properties to them. These two approaches focus only on the validation single service of security properties, while our approach allows the validation of workflow fragments and the substitution of services with service compositions.…”
Section: Related Workmentioning
confidence: 99%