2005
DOI: 10.1007/11535706_22
|View full text |Cite
|
Sign up to set email alerts
|

Trading Off Security in a Service Oriented Architecture

Abstract: Abstract. Service oriented architectures provide a simple yet flexible model of a computing system as a graph of services making requests and providing results to each other. In this paper we define a formal model of a service oriented architecture and using it, we define metrics for performance, for availability, and for various security properties. These metrics serve as the basis for expressing the business requirements. To make trade-offs possible we also define a set of cost metrics, denominated in a unif… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2006
2006
2011
2011

Publication Types

Select...
2
1
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 7 publications
(8 reference statements)
0
5
0
Order By: Relevance
“…Services can be primitive, or combined for representing the collaboration with other services. In this subsection, we extend model proposed by Swart et al [16] and define the SOA software system model for security analysis, as shown in Fig. 1.…”
Section: A Soa Software System Modelmentioning
confidence: 99%
“…Services can be primitive, or combined for representing the collaboration with other services. In this subsection, we extend model proposed by Swart et al [16] and define the SOA software system model for security analysis, as shown in Fig. 1.…”
Section: A Soa Software System Modelmentioning
confidence: 99%
“…For example, in practice, the more firewalls/subnets that have to be traversed to directly access a node, then the more 'secure' the node is considered to be. The notion of security distance is defined in [21] as the minimum number of servers and/or firewalls that an attacker on the Internet must compromise to obtain direct access to some protected service. We argue that security distance in this case is equivalent to using a weighted c-semiring with each system having an equal rating of '1'.…”
Section: Examplementioning
confidence: 99%
“…A soft-constraint encoding of the revised SAN model will also provide access to techniques for exploring and manipulating SAN configurations. This will be especially useful when making tradeoffs of quality of protection against other attributes such as cost and performance [1,31]. Exploring how our soft-constraint framework can facilitate making such tradeoffs is a topic for future research.…”
Section: Discussionmentioning
confidence: 99%
“…The model that is proposed in this paper forms a part of our ongoing research in using constraint solving techniques as a practical approach for reasoning about security [1,[3][4][5]31]. Building on the results in [4] we demonstrate in this paper that determining whether a particular system configuration meets a quality of protection measure can be described as a constraint satisfaction problem.…”
Section: Introductionmentioning
confidence: 86%
See 1 more Smart Citation