Abstract
In this paper, we provide significant contributions on top of a recent successful framework for supporting the interoperability of so-called security-aware Web Service Business Processes, i.e. Web Service Business Processes that incorporate Access Control Policies (ACP), via assessing and verifying its reliability on the basis of some well-suited case studies. Our evidence fully demonstrates the effectiveness as well as the robustness of the investigated framework. We complete our analytical contributions by means of a critical discussion on the advantages and possible extensions of this framework.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Benatallah, B., Nezhad, H.R.M., Casati, F., Toumani, F., Ponge, J.: Service Mosaic: A Model-Driven Framework for Web Services Life-Cycle Management. IEEE Internet Computing 10(4), 55–63 (2006)
Benatallah, B., Hamid, R., Nezhad, H.R.M.: Service Mosaic Project: Modeling, Analysis and Management of Web Services Interactions. In: Proceedings of APCCM, pp. 7–9 (2006)
Benatallah, B., Casati, F., Toumani, F.: Representing, Analyzing and Managing Web Service Protocols. Data & Knowledge Engineering 58(3), 327–357 (2006)
Nezhad, H.R.M., Benatallah, B., Martens, A., Curbera, F., Casati, F.: Semi-Automated Adaptation of Service Interactions. In: Proceedings of WWW, pp. 993–1002 (2007)
Nezhad, H.R.M., Saint-Paul, R., Benatallah, B., Casati, F., Ponge, J., Toumani, F.: Service Mosaic: Interactive Analysis and Manipulation of Service Conversations. In: Proceedings of ICDE, pp. 1497–1498 (2007)
Sipser, M.: Introduction to the Theory of Computation. PWS Publishing (1997)
Alur, R., Dill, D.L.: A Theory of Timed Automata. Theoretical Computer Science 126(2), 183–235 (1994)
Bouyer, P., Markey, N., Ouaknine, J., Worrell, J.B.: On Expressiveness and Complexity in Real-Time Model Checking. In: Aceto, L., DamgĂ¥rd, I., Goldberg, L.A., HalldĂ³rsson, M.M., IngĂ³lfsdĂ³ttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 124–135. Springer, Heidelberg (2008)
Ponge, J., Benatallah, B., Casati, F., Toumani, F.: Analysis and Applications of Timed Service Protocols. ACM Transactions on Software Engineering and Methodology 19(4), art. no. 11 (2010)
Mokhtari-Aslaoui, K., Benbernou, S., Sahri, S., Andrikopoulos, V., Leymann, F., Hacid, M.-S.: Timed Privacy-Aware Business Protocols. International Journal of Cooperative Information Systems 21(2), 85–110 (2012)
Hamadi, R., Paik, H.-Y., Benatallah, B.: Conceptual Modeling of Privacy-Aware Web Service Protocols. In: Krogstie, J., Opdahl, A.L., Sindre, G. (eds.) CAiSE 2007. LNCS, vol. 4495, pp. 233–248. Springer, Heidelberg (2007)
Samarati, P., de Vimercati, S.C.: Access Control: Policies, Models, and Mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 137–196. Springer, Heidelberg (2001)
Elabd, E., Coquery, E., Hacid, M.-S.: Checking Compatibility and Replaceability in Web Services Business Protocols with Access Control. In: Proceedings of ICWS, pp. 409–416 (2010)
Elabd, E., Coquery, E., Hacid, M.-S.: From Implicit to Explicit Transitions in Business Protocols: A Semantic-Based Transformation. International Journal of Web Service Research 9(4), 69–95 (2012)
Ponge, J., Benatallah, B., Casati, F., Toumani, F.: Fine-Grained Compatibility and Replaceability Analysis of Timed Web Service Protocols. In: Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.) ER 2007. LNCS, vol. 4801, pp. 599–614. Springer, Heidelberg (2007)
Fensel, D.: Ontologies: Silver Bullet for Knowledge Management and Electronic Commerce. Springer (2003)
Nejdl, W., Olmedilla, D., Winslett, M., Zhang, C.C.: Ontology-Based Policy Specification and Management. In: GĂ³mez-PĂ©rez, A., Euzenat, J. (eds.) ESWC 2005. LNCS, vol. 3532, pp. 290–302. Springer, Heidelberg (2005)
Wei, L., et al.: Security and Privacy for Storage and Computation in Cloud Computing. Information Sciences 258, 371–386 (2014)
Wei, L., et al.: SecCloud: Bridging Secure Storage and Computation in Cloud. In: Proceedings of ICDCS Workshops, pp. 52–61 (2010)
Reza Rahimi, M., et al.: MuSIC: Mobility-Aware Optimal Service Allocation in Mobile Cloud Computing. In: Proceedings of IEEE CLOUD, pp. 75–82 (2013)
Sheng, Q.Z., et al.: Web Services Composition: A Decade’s Overview. Information Sciences 280, 218–238 (2014)
Duan, Q., et al.: A Survey on Service-Oriented Network Virtualization Toward Convergence of Networking and Cloud Computing. IEEE Transactions on Network and Service Management 9(4), 373–392 (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Cuzzocrea, A., RodinĂ², V. (2014). Interoperability of Security-Aware Web Service Business Processes: Case Studies and Empirical Evaluation. In: Fortino, G., Di Fatta, G., Li, W., Ochoa, S., Cuzzocrea, A., Pathan, M. (eds) Internet and Distributed Computing Systems. IDCS 2014. Lecture Notes in Computer Science, vol 8729. Springer, Cham. https://doi.org/10.1007/978-3-319-11692-1_25
Download citation
DOI: https://doi.org/10.1007/978-3-319-11692-1_25
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11691-4
Online ISBN: 978-3-319-11692-1
eBook Packages: Computer ScienceComputer Science (R0)