Skip to main content

Choreographing Security and Performance Analysis for Web Services

  • Conference paper
Formal Techniques for Computer Systems and Business Processes (EPEW 2005, WS-FM 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3670))

Abstract

We describe a UML-based method which supports model-driven development of service-oriented architectures including those used in Web services. Analysable content is extracted from the UML models in the form of process calculus descriptions. These are analysed to provide strong guarantees of satisfactory security and performance. The results are reflected back in the form of a modified version of the UML model which highlights points of the design which can give rise to operational difficulties. A design platform supporting the methodology, Choreographer, interoperates with state-of-the-art UML modelling tools such as Poseidon. We illustrate the approach on an example.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gentleware AG systems. Poseidon for UML web site (November 2004), http://www.gentleware.com/

  2. Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Nielson, H.R.: Automatic validation of protocol narration. In: Proc. of the 16th Computer Security Foundations Workshop (CSFW 2003), pp. 126–140. IEEE Computer Society Press, Los Alamitos (2003)

    Chapter  Google Scholar 

  3. Hillston, J.: A Compositional Approach to Performance Modelling. Cambridge University Press, Cambridge (1996)

    Book  Google Scholar 

  4. Buchholtz, M., Montangero, C., Perrone, L., Semprini, S.: For-LySa: UML for authentication analysis. In: Priami, C., Quaglia, P. (eds.) GC 2004. LNCS, vol. 3267, pp. 92–105. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Gollmann, D.: Computer Security. Wiley, Chichester (1999)

    Google Scholar 

  6. Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Transactions on Information Theory 22(6), 198–208 (1983)

    Article  MathSciNet  Google Scholar 

  7. Nielson, F., Nielson, H.R., Sun, H., Buchholtz, M., Hansen, R.R., Pilegaard, H., Seidl, H.: The Succinct Solver suite. In: Jensen, K., Podelski, A. (eds.) TACAS 2004. LNCS, vol. 2988, pp. 251–265. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  8. López-Grao, J.P., Merseguer, J., Campos, J.: From UML activity diagrams to stochastic Petri nets: Application to software performance analysis. In: Proceedings of the Seventeenth International Symposium on Computer and Information Sciences, Orlando, Florida, October 2002, pp. 405–409. CRC Press, Boca Raton (2002)

    Google Scholar 

  9. López-Grao, J.P., Merseguer, J., Campos, J.: From UML activity diagrams to Stochastic Petri nets: application to software performance engineering. In: Proceedings of the fourth international Workshop on Software and Performance, pp. 25–36. ACM Press, New York (2004)

    Chapter  Google Scholar 

  10. Petriu, D.C., Shen, H.: Applying the UML performance profile: Graph grammar-based derivation of LQN models from UML specifications. In: Field, T., Harrison, P.G., Bradley, J., Harder, U. (eds.) TOOLS 2002. LNCS, vol. 2324, pp. 159–177. Springer, Heidelberg (2002)

    Google Scholar 

  11. Lindemann, C., Thümmler, A., Klemm, A., Lohmann, M., Waldhorst, O.P.: Performance analysis of time-enhanced UML diagrams based on stochastic processes. In: Tucci [15], pp. 25–34

    Google Scholar 

  12. Bernardi, S., Donatelli, S., Merseguer, J.: From UML sequence diagrams and statecharts to analysable Petri net models. In: Tucci [15], pp. 35–45

    Google Scholar 

  13. Jürjens, J.: UMLsec: Extending UML for secure systems development. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, p. 412. Springer, Heidelberg (2002)

    Google Scholar 

  14. Jürjens, J.: Secure Systems Development with UML. Springer, Heidelberg (2004)

    Google Scholar 

  15. Tucci, S. (ed.): Proceedings of the Third International Workshop on Software and Performance (WOSP 2002), July 2002. ACM Press, Rome (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gilmore, S., Haenel, V., Kloul, L., Maidl, M. (2005). Choreographing Security and Performance Analysis for Web Services. In: Bravetti, M., Kloul, L., Zavattaro, G. (eds) Formal Techniques for Computer Systems and Business Processes. EPEW WS-FM 2005 2005. Lecture Notes in Computer Science, vol 3670. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11549970_15

Download citation

  • DOI: https://doi.org/10.1007/11549970_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28701-8

  • Online ISBN: 978-3-540-31903-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics