Skip to main content

Orchestration under Security Constraints

  • Conference paper
Formal Methods for Components and Objects (FMCO 2010)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 6957))

Included in the following conference series:

Abstract

Automatic composition of web services is a challenging task. Many works have considered simplified automata models that abstract away from the structure of messages exchanged by the services. For the domain of secured services (using e.g. digital signing or timestamping) we propose a novel approach to automated composition of services based on their security policies. Given a community of services and a goal service, we reduce the problem of composing the goal from services in the community to a security problem where an intruder should intercept and redirect messages from the service community and a client service till reaching a satisfying state. We have implemented the algorithm in AVANTSSAR Platform [5] and applied the tool to several case studies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. AVANTSSAR. Deliverable 2.1: Requirements for modelling and ASLan v.1 (2008), http://www.avantssar.eu

  2. AVANTSSAR. Deliverable 2.3: ASLan final version with dynamic service and policy composition (2010), http://www.avantssar.eu

  3. AVANTSSAR. Deliverable 5.1: Problem cases and their trust and security requirements (2008), http://www.avantssar.eu

  4. AVANTSSAR. Deliverable 5.4: Assessment of the AVANTSSAR Validation Platform (2010), http://www.avantssar.eu

  5. AVANTSSAR. AVANTSSAR Platform (2010), http://www.avantssar.eu

  6. Armando, A., et al.: The Avispa Tool for the automated validation of internet security protocols and applications, http://www.avispa-project.org/

  7. AVISPA Deliverable 2.3: The Intermediate Format (2003), http://www.avispa-project.org

  8. Berardi, D., Calvanese, D., De Giacomo, G., Lenzerini, M., Mecella, M.: Automatic Composition of E-services That Export Their Behavior. In: Orlowska, M.E., Weerawarana, S., Papazoglou, M.P., Yang, J. (eds.) ICSOC 2003. LNCS, vol.Ā 2910, pp. 43ā€“58. Springer, Heidelberg (2003)

    ChapterĀ  Google ScholarĀ 

  9. Berardi, D., Calvanese, D., De Giacomo, G., Hull, R., Mecella, M.: Automatic composition of transition-based semantic web services with messaging. In: Proceedings of the 31st International Conference on Very Large Data Bases, Trondheim, Norway, August 30 - September 2, pp. 613ā€“624. ACM, New York (2005)

    Google ScholarĀ 

  10. Bultan, T., Su, J., Fu, X.: Analyzing conversations of Web services. In: Proceedings of the Internet Computing, pp. 18ā€“25. IEEE, Los Alamitos (2006)

    Google ScholarĀ 

  11. Bultan, T., Fu, X., Hull, R., Su, J.: Conversation specification: a new approach to design and analysis of e-service composition. In: Proceedings of the International Conference on World Wide Web, WWW 2003, pp. 403ā€“410 (2003)

    Google ScholarĀ 

  12. Colombo, M., Di Nitto, E., Mauri, M.: SCENE: A Service Composition Execution Environment Supporting Dynamic Changes Disciplined Through Rules. In: Dan, A., Lamersdorf, W. (eds.) ICSOC 2006. LNCS, vol.Ā 4294, pp. 191ā€“202. Springer, Heidelberg (2006)

    ChapterĀ  Google ScholarĀ 

  13. Dolev, D., Yao, A.: On the Security of Public-Key Protocols. IEEE Transactions on Information TheoryĀ 2(29) (1983)

    Google ScholarĀ 

  14. McAllester, D.A.: Automatic Recognition of Tractability in Inference Relations. Journal of the ACMĀ 40, 284ā€“303 (1993)

    ArticleĀ  MathSciNetĀ  MATHĀ  Google ScholarĀ 

  15. Monfroy, E., Perrin, O., Ringeissen, C.: Dynamic Web Services Provisioning with Constraints. In: Meersman, R., Tari, Z. (eds.) OTM 2008, Part I. LNCS, vol.Ā 5331, pp. 26ā€“43. Springer, Heidelberg (2008)

    ChapterĀ  Google ScholarĀ 

  16. Oasis Technical Comittee on Secure Exchange. Ws-securitypolicy 1.2 (2007), http://doc.oasis-open.org/ws-sx/ws-securitypolicy/200702/ws-securitypolicy-1.2-spec-cd-02.pdf

  17. Pistore, M., Marconi, A., Bertoli, P., Traverso, P.: Automated Composition of Web Services by Planning at the Knowledge Level. In: International Joint Conference on Artificial Intelligence, IJCAI (2005)

    Google ScholarĀ 

  18. Sheth, A.P., Kashyap, V.: So far (schematically) yet so near (semantically). In: Hsiao, D.K., Neuhold, E.J., Sacks-Davis, R. (eds.) DS-5. IFIP Transactions, vol.Ā A-25, pp. 283ā€“312. North-Holland, Amsterdam (1992)

    Google ScholarĀ 

  19. World Wide Web Consortium. Simple Object Access Protocol 1.2 (April 2007), http://www.w3.org/TR/soap12-part1

  20. Rusinowitch, M., Turuani, M.: Protocol insecurity with finite number of sessions is NP-complete. In: Proc.14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia (June 2001)

    Google ScholarĀ 

  21. Turuani, M.: The CL-Atse Protocol Analyser. In: Pfenning, F. (ed.) RTA 2006. LNCS, vol.Ā 4098, pp. 277ā€“286. Springer, Heidelberg (2006)

    ChapterĀ  Google ScholarĀ 

  22. Oasis Consortium. Web Services Business Process Execution Language Version 2.0. (January 23, 2006), http://www.oasis-open.org/committees/documents.php?wg_abbrev=wsbpel

  23. World Wide Web Consortium. Web Services Description Language (WSDL) 1.1 (March 15, 2001), http://www.w3.org/TR/wsdl ,

  24. Wu, Z., Gomadam, K., Ranabahu, A., Sheth, A., Miller, J.: Automatic Composition of Semantic Web Services Using Process Mediation. In: ICEIS, vol.Ā (4), pp. 453ā€“462 (2007)

    Google ScholarĀ 

  25. World Wide Web Consortium. XML Path Language (XPath) 2.0. (January 23, 2007), http://www.w3.org/TR/xpath20/

  26. World Wide Web Consortium. XML Schema Definition (XSD) (March 2005), http://www.w3.org/XML/Schema

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chevalier, Y., Mekki, M.A., Rusinowitch, M. (2011). Orchestration under Security Constraints. In: Aichernig, B.K., de Boer, F.S., Bonsangue, M.M. (eds) Formal Methods for Components and Objects. FMCO 2010. Lecture Notes in Computer Science, vol 6957. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25271-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25271-6_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25270-9

  • Online ISBN: 978-3-642-25271-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics