Planning and verifying service composition
Author(s) -
Massimo Bartoletti,
Pierpaolo Degano,
Gian-Luigi Ferrari
Publication year - 2009
Publication title -
journal of computer security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.201
H-Index - 56
eISSN - 1875-8924
pISSN - 0926-227X
DOI - 10.3233/jcs-2009-0357
Subject(s) - service composition , computer science , composition (language) , service (business) , software engineering , programming language , business , web service , linguistics , philosophy , marketing
A static approach is proposed to study secure composition of services.\udWe extend the $\lambda$-calculus with primitives for selecting and\udinvoking services that respect given security requirements.\udSecurity-critical code is enclosed in policy framings with a possibly\udnested, local scope. \udPolicy framings enforce safety and liveness properties. \udThe actual run-time behaviour of services is over-approximated by \uda type and effect system.\udTypes are standard, and effects include the actions with possible security \udconcerns --- as well as information about which services may be invoked \udat run-time. \udAn approximation is model checked to verify policy framings within\udtheir scopes. \udThis allows for removing any run-time execution monitor, \udand for determining the plans driving the selection of those\udservices that match the security requirements on demand
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom