Policy-Based Security Engineering of Service Oriented Systems

Author(s):  
Antonio Maña ◽  
Gimena Pujol ◽  
Antonio Muñoz

In this chapter the authors present a policy-based security engineering process for service oriented applications, developed in the SERENITY and MISTICO projects. Security and dependability (S&D) are considered as first-class citizens in the proposed engineering process, which is based on the precise description of reusable security and dependability solutions. The authors’ process is based on the concept of S&D Pattern as the means to capture the specialized knowledge of security engineers and to make it available for automated processing, both in the development process (the focus of this chapter) and later at runtime. In particular, in this chapter they focus on the verification of the compliance with security policies, based on the formal specification of S&D Properties. The main advantages of the approach presented in this chapter are precisely that it allows us to define high-level policies and to verify that a secure oriented system complies with such policy (developed following the SERENITY approach). They also describe the application of the proposed approach to the verification of S&D properties in the web services (WS) environment. Concretely, the authors describe the use of SERENITY framework to facilitate the development of applications that use standard security mechanisms (such WS-Security, WS-Policy, WS-Security Policy, etc) and to ensure the correct application of these standard mechanisms, based on predefined policies. Finally, they show how to verify that the application complies with one or several S&D policies.

2010 ◽  
pp. 392-406
Author(s):  
Antonio Maña ◽  
Gimena Pujol ◽  
Antonio Muñoz

In this chapter the authors present a policy-based security engineering process for service oriented applications, developed in the SERENITY and MISTICO projects. Security and dependability (S&D) are considered as first-class citizens in the proposed engineering process, which is based on the precise description of reusable security and dependability solutions. The authors’ process is based on the concept of S&D Pattern as the means to capture the specialized knowledge of security engineers and to make it available for automated processing, both in the development process (the focus of this chapter) and later at runtime. In particular, in this chapter they focus on the verification of the compliance with security policies, based on the formal specification of S&D Properties. The main advantages of the approach presented in this chapter are precisely that it allows us to define high-level policies and to verify that a secure oriented system complies with such policy (developed following the SERENITY approach). They also describe the application of the proposed approach to the verification of S&D properties in the web services (WS) environment. Concretely, the authors describe the use of SERENITY framework to facilitate the development of applications that use standard security mechanisms (such WS-Security, WS-Policy, WS-Security Policy, etc) and to ensure the correct application of these standard mechanisms, based on predefined policies. Finally, they show how to verify that the application complies with one or several S&D policies.


Author(s):  
Srividya Kona ◽  
Ajay Bansal ◽  
Luke Simon ◽  
Ajay Mallya ◽  
Gopal Gupta ◽  
...  

Web services and Service-Oriented Computing is being widely adopted. In order to effectively reuse existing services, we need an infrastructure that allows users and applications to discover, deploy, compose, and synthesize services automatically. This automation can take place only if a formal description of the Web services is available. In this article we present an infrastructure using USDL (Universal Service-Semantics Description Language), a language for formally describing the semantics of Web services. USDL is based on the Web Ontology Language (OWL) and employs WordNet as a common basis for understanding the meaning of services. USDL can be regarded as formal service documentation that will allow sophisticated conceptual modeling and searching of available Web services, automated service composition, and other forms of automated service integration. A theory of service substitution using USDL is presented. The rationale behind the design of USDL along with its formal specification in OWL is presented with examples. We also compare USDL with other approaches like OWL-S, WSDL-S, and WSML and show that USDL is complementary to these approaches.


Author(s):  
Fani A. Tzima ◽  
Pericles A. Mitkas

This chapter examines the concept of Service-Oriented Architecture (SOA) in conjunction with the Web Services technology as an implementation of the former’s design principles. Following a brief introduction of SOA and its advantages, a high-level overview of the structure and composition of the Web Services platform is provided. This overview covers the core Web services specifications as well as features of the extended architecture stack, which together form a powerful and robust foundation for building distributed systems. The chapter concludes with a discussion of the scope of applicability of SOA and Web services. The overall goal of this chapter is to portray the key assets of the presented technologies and evaluate them as tools for handling adaptability, portability, and interoperability issues that arise in modern business environments.


Author(s):  
Andrew M. Olson ◽  
Rajeev R. Raje ◽  
Barrett R. Bryant ◽  
Carol C. Burt ◽  
Mikhail Auguston

This chapter introduces the UniFrame approach to creating high quality computing systems from heterogeneous components distributed over a network. It describes how this approach employs a unifying framework for specifying such systems to unite the concepts of service-oriented architectures, a component-based software engineering methodology and a mechanism for automatically finding components on a network in order to assemble a specified system. UniFrame employs a formal specification language to define the components and serve as a basis for generating glue/wrapper code that connects heterogeneous components. It also provides a high level language for the system developer to use for inserting code in a created system to validate it empirically and estimate the quality of service it supports. The chapter demonstrates how a comprehensive approach, which involves the practicing community as well as technical experts, can lead to solutions of many of the difficulties inherent in constructing distributed computing systems.


Author(s):  
Дмитрий Рубвальтер ◽  
Dmitry Rubvalter ◽  
Александр Либкинд ◽  
Alexander Libkind ◽  
Валентина Маркусова ◽  
...  

A multidimensional analysis of the state of Russian studies on the education issues over 1993–2016 was carried out based on the materials of the data contained in the Web of Science (SSCI, A & HCI and SCI-E databases). There were determined the dynamics and trends of a number of relevant indicators, such as the number of Russian publications by year, the share of these publications in the global flow of publications on education issues, the dynamics of the share of publications made in co-authorship with foreign colleagues, etc. A number of distributions of Russian publications on educational issues was compiled and analyzed: by journals, by Russian regions and cities, by organizations and authors of the publications. It was found that most of these distributions were characterized by a high level of non-uniformity. A list of journals (125 titles) in which Russian works on education issues had been published was compiled. Russian organizations (308) and domestic researchers (about two thousand) engaged in studying the issues of education were identified. It was discovered that more than 200 organizations and about 400 academicians from 60 foreign countries had participated in Russian studies on the education issues.


2021 ◽  
Vol 15 (2) ◽  
pp. 1-25
Author(s):  
Amal Alhosban ◽  
Zaki Malik ◽  
Khayyam Hashmi ◽  
Brahim Medjahed ◽  
Hassan Al-Ababneh

Service-Oriented Architectures (SOA) enable the automatic creation of business applications from independently developed and deployed Web services. As Web services are inherently a priori unknown, how to deliver reliable Web services compositions is a significant and challenging problem. Services involved in an SOA often do not operate under a single processing environment and need to communicate using different protocols over a network. Under such conditions, designing a fault management system that is both efficient and extensible is a challenging task. In this article, we propose SFSS, a self-healing framework for SOA fault management. SFSS is predicting, identifying, and solving faults in SOAs. In SFSS, we identified a set of high-level exception handling strategies based on the QoS performances of different component services and the preferences articled by the service consumers. Multiple recovery plans are generated and evaluated according to the performance of the selected component services, and then we execute the best recovery plan. We assess the overall user dependence (i.e., the service is independent of other services) using the generated plan and the available invocation information of the component services. Due to the experiment results, the given technique enhances the service selection quality by choosing the services that have the highest score and betters the overall system performance. The experiment results indicate the applicability of SFSS and show improved performance in comparison to similar approaches.


2018 ◽  
Vol 6 (2) ◽  
pp. 221-234
Author(s):  
T.C. Sandanayake ◽  
P.G.C. Jayangani

Software as a service (SaaS) is one type of the cloud computing that has gained more popularity in the world. It is a way of delivering the software through the internet to its end users. Then users can use it through subscriptions from vendors.  Users have to pay only for what they use. SaaS architecture is a very high level model which is based on Application Service Provider (ASP) concept and Service Oriented Architecture. Currently many organizations are using SaaS as it is a service centric model and it uses technologies like multi-tenant architecture which in turn provides the users with many desired set of features. SaaS also have some security challenges which can be classified under data, application and deployment of SaaS architecture. Furthermore there are many emerging trends in SaaSwhich are focused on full filling advanced customer demands. This research study is evaluating the current trends, approaches and applications of SAAS.


2018 ◽  
Vol 36 (6) ◽  
pp. 1114-1134 ◽  
Author(s):  
Xiufeng Cheng ◽  
Jinqing Yang ◽  
Lixin Xia

PurposeThis paper aims to propose an extensible, service-oriented framework for context-aware data acquisition, description, interpretation and reasoning, which facilitates the development of mobile applications that provide a context-awareness service.Design/methodology/approachFirst, the authors propose the context data reasoning framework (CDRFM) for generating service-oriented contextual information. Then they used this framework to composite mobile sensor data into low-level contextual information. Finally, the authors exploited some high-level contextual information that can be inferred from the formatted low-level contextual information using particular inference rules.FindingsThe authors take “user behavior patterns” as an exemplary context information generation schema in their experimental study. The results reveal that the optimization of service can be guided by the implicit, high-level context information inside user behavior logs. They also prove the validity of the authors’ framework.Research limitations/implicationsFurther research will add more variety of sensor data. Furthermore, to validate the effectiveness of our framework, more reasoning rules need to be performed. Therefore, the authors may implement more algorithms in the framework to acquire more comprehensive context information.Practical implicationsCDRFM expands the context-awareness framework of previous research and unifies the procedures of acquiring, describing, modeling, reasoning and discovering implicit context information for mobile service providers.Social implicationsSupport the service-oriented context-awareness function in application design and related development in commercial mobile software industry.Originality/valueExtant researches on context awareness rarely considered the generation contextual information for service providers. The CDRFM can be used to generate valuable contextual information by implementing more reasoning rules.


Sign in / Sign up

Export Citation Format

Share Document