Ensuring the preservation of security is a key requirement and challenge for Service-Based Systems (SBS) due to the use of third party software services not operating under different security perimeters. In this paper, we present an approach for verifying the security properties of SBS workflows and adapting them if such properties are not preserved. Our approach uses secure service composition patterns. These patterns encode proven dependencies between service level and workflow level security properties. These dependencies are used in reasoning processes supporting the verification of SBS workflows with respect to workflow security properties and their adaptation in ways that guarantee the properties if necessary. Our approach has been ...
A static approach is proposed to study secure composition of services. We extend the λ-calculus with...
Building secure applications requires significant expertise. Secure platforms and security patterns ...
Building secure applications requires significant expertise. Secure platforms and security patterns ...
Ensuring the preservation of security is a key requirement and challenge for Service-Based Systems (...
Ensuring the preservation of security is a key requirement and challenge for Service-Based Systems (...
Ensuring the preservation of security is a key requirement and challenge for Service-Based Systems (...
Security is an important concern for service based systems, i.e., systems that are composed of auton...
Ensuring that the compositions of services that constitute service-based systems satisfy given secur...
This paper presents an approach that we have developed to support the design of secure service based...
This paper presents an approach that we have developed to support the design of secure service based...
In service based applications, it is often necessary to construct compositions of services in order ...
Ensuring that the compositions of services that constitute service-based systems satisfy given secur...
Abstract Nowadays, most computing systems are based on service-oriented computing (SOC). This paradi...
This is the author accepted manuscript. The final version is available from the publisher via the DO...
In the world of large-scale applications, software-as-a-service (SaaS) in general and use of micro-s...
A static approach is proposed to study secure composition of services. We extend the λ-calculus with...
Building secure applications requires significant expertise. Secure platforms and security patterns ...
Building secure applications requires significant expertise. Secure platforms and security patterns ...
Ensuring the preservation of security is a key requirement and challenge for Service-Based Systems (...
Ensuring the preservation of security is a key requirement and challenge for Service-Based Systems (...
Ensuring the preservation of security is a key requirement and challenge for Service-Based Systems (...
Security is an important concern for service based systems, i.e., systems that are composed of auton...
Ensuring that the compositions of services that constitute service-based systems satisfy given secur...
This paper presents an approach that we have developed to support the design of secure service based...
This paper presents an approach that we have developed to support the design of secure service based...
In service based applications, it is often necessary to construct compositions of services in order ...
Ensuring that the compositions of services that constitute service-based systems satisfy given secur...
Abstract Nowadays, most computing systems are based on service-oriented computing (SOC). This paradi...
This is the author accepted manuscript. The final version is available from the publisher via the DO...
In the world of large-scale applications, software-as-a-service (SaaS) in general and use of micro-s...
A static approach is proposed to study secure composition of services. We extend the λ-calculus with...
Building secure applications requires significant expertise. Secure platforms and security patterns ...
Building secure applications requires significant expertise. Secure platforms and security patterns ...