Bo Zhou, D. Llewellyn-Jones, Q. Shi, M. Asim, M. Merabti, D. Lamb
{"title":"A Compose Language-Based Framework for Secure Service Composition","authors":"Bo Zhou, D. Llewellyn-Jones, Q. Shi, M. Asim, M. Merabti, D. Lamb","doi":"10.1109/CyberSecurity.2012.32","DOIUrl":null,"url":null,"abstract":"Security is crucial in service composition. Any changes made to the composition may result in undesirable security properties for the composed system. An effective monitoring and analysis mechanism is needed to protect the dynamically changing service composition at run-time. This paper introduces a modelling platform that allows the demonstration and testing of secure service composition as the composition develops over time. With its graphical user interface, participating services and their relationships are easily monitored and analysed. A script composition language is also explained in the paper. It has been used to implement security policies for the service composition.","PeriodicalId":162858,"journal":{"name":"2012 International Conference on Cyber Security","volume":"137 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Cyber Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CyberSecurity.2012.32","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Security is crucial in service composition. Any changes made to the composition may result in undesirable security properties for the composed system. An effective monitoring and analysis mechanism is needed to protect the dynamically changing service composition at run-time. This paper introduces a modelling platform that allows the demonstration and testing of secure service composition as the composition develops over time. With its graphical user interface, participating services and their relationships are easily monitored and analysed. A script composition language is also explained in the paper. It has been used to implement security policies for the service composition.