z-logo
open-access-imgOpen Access
Planning and verifying service composition
Author(s) -
Massimo Bartoletti,
Pierpaolo Degano,
Gian-Luigi Ferrari
Publication year - 2009
Publication title -
journal of computer security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.201
H-Index - 56
eISSN - 1875-8924
pISSN - 0926-227X
DOI - 10.3233/jcs-2009-0357
Subject(s) - service composition , computer science , composition (language) , service (business) , software engineering , programming language , business , web service , linguistics , philosophy , marketing
A static approach is proposed to study secure composition of services.\udWe extend the $\lambda$-calculus with primitives for selecting and\udinvoking services that respect given security requirements.\udSecurity-critical code is enclosed in policy framings with a possibly\udnested, local scope. \udPolicy framings enforce safety and liveness properties. \udThe actual run-time behaviour of services is over-approximated by \uda type and effect system.\udTypes are standard, and effects include the actions with possible security \udconcerns --- as well as information about which services may be invoked \udat run-time. \udAn approximation is model checked to verify policy framings within\udtheir scopes. \udThis allows for removing any run-time execution monitor, \udand for determining the plans driving the selection of those\udservices that match the security requirements on demand

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom