2006
DOI: 10.1007/11768869_1
|View full text |Cite
|
Sign up to set email alerts
|

Security Issues in Service Composition

Abstract: Abstract. We use a distributed, enriched λ-calculus for describing networks of services. Both services and their clients can protect themselves, by imposing security constraints on each other's behaviour. Then, service interaction results in a call-by-property mechanism, that matches the client requests with service's. A static approach is also described, that determines how to compose services while guaranteeing that their execution is always secure, without resorting to any dynamic check.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2006
2006
2014
2014

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 33 publications
0
6
0
Order By: Relevance
“…A first step towards a framework for modelling and analysing security and trust for services includes trust management and static analysis techniques for cryptoprotocols [26,36], security issues on shared space coordination languages [20], secure service composition [1], techniques for ensuring constraints on interfaces between services [29], and autonomic security mechanisms [23]. The results for control resource usage by services range from a flow logic for resource access control [20] and model checking properties of workflow processes [24] to type systems for confining movements of data and processes [13] and for composing incomplete software components [2].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…A first step towards a framework for modelling and analysing security and trust for services includes trust management and static analysis techniques for cryptoprotocols [26,36], security issues on shared space coordination languages [20], secure service composition [1], techniques for ensuring constraints on interfaces between services [29], and autonomic security mechanisms [23]. The results for control resource usage by services range from a flow logic for resource access control [20] and model checking properties of workflow processes [24] to type systems for confining movements of data and processes [13] and for composing incomplete software components [2].…”
Section: Discussionmentioning
confidence: 99%
“…The SENSORIA Consortium consists of 12 universities, two research institutes and four companies (two SMEs) from seven countries 1 .…”
Section: Sensoriamentioning
confidence: 99%
“…Other research strands of SENSORIA comprise a probabilistic extension of a Linda-like language for service-oriented computing [12] and stochastic extensions of KLAIM [32] and beta-binders [15]. SENSORIA addresses security issues ranging from sandboxing for KLAIM [21], trust management for autonomic grid services [26], and security of service composition [4] to a formal framework for security and trust in the requirements phase of system development [20].…”
Section: Discussionmentioning
confidence: 99%
“…For example, [5] introduces an extension of the λ-calculus with primitive constructs for call-by-contract invocation for which a completely static approach for regulating secure service composition has been devised. In particular, an automatic machinery, based on a type system and a model-checking technique, has been defined to construct a viable plan for the execution of services belonging to a given orchestration.…”
Section: Related Workmentioning
confidence: 99%