Skip to main content

Interoperability of Security-Aware Web Service Business Processes: Case Studies and Empirical Evaluation

  • Conference paper
Internet and Distributed Computing Systems (IDCS 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8729))

Included in the following conference series:

  • 1345 Accesses

Abstract

In this paper, we provide significant contributions on top of a recent successful framework for supporting the interoperability of so-called security-aware Web Service Business Processes, i.e. Web Service Business Processes that incorporate Access Control Policies (ACP), via assessing and verifying its reliability on the basis of some well-suited case studies. Our evidence fully demonstrates the effectiveness as well as the robustness of the investigated framework. We complete our analytical contributions by means of a critical discussion on the advantages and possible extensions of this framework.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Benatallah, B., Nezhad, H.R.M., Casati, F., Toumani, F., Ponge, J.: Service Mosaic: A Model-Driven Framework for Web Services Life-Cycle Management. IEEE Internet Computing 10(4), 55–63 (2006)

    Article  Google Scholar 

  2. Benatallah, B., Hamid, R., Nezhad, H.R.M.: Service Mosaic Project: Modeling, Analysis and Management of Web Services Interactions. In: Proceedings of APCCM, pp. 7–9 (2006)

    Google Scholar 

  3. Benatallah, B., Casati, F., Toumani, F.: Representing, Analyzing and Managing Web Service Protocols. Data & Knowledge Engineering 58(3), 327–357 (2006)

    Article  Google Scholar 

  4. Nezhad, H.R.M., Benatallah, B., Martens, A., Curbera, F., Casati, F.: Semi-Automated Adaptation of Service Interactions. In: Proceedings of WWW, pp. 993–1002 (2007)

    Google Scholar 

  5. Nezhad, H.R.M., Saint-Paul, R., Benatallah, B., Casati, F., Ponge, J., Toumani, F.: Service Mosaic: Interactive Analysis and Manipulation of Service Conversations. In: Proceedings of ICDE, pp. 1497–1498 (2007)

    Google Scholar 

  6. Sipser, M.: Introduction to the Theory of Computation. PWS Publishing (1997)

    Google Scholar 

  7. Alur, R., Dill, D.L.: A Theory of Timed Automata. Theoretical Computer Science 126(2), 183–235 (1994)

    Article  MATH  MathSciNet  Google Scholar 

  8. Bouyer, P., Markey, N., Ouaknine, J., Worrell, J.B.: On Expressiveness and Complexity in Real-Time Model Checking. In: Aceto, L., DamgĂ¥rd, I., Goldberg, L.A., HalldĂ³rsson, M.M., IngĂ³lfsdĂ³ttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 124–135. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  9. Ponge, J., Benatallah, B., Casati, F., Toumani, F.: Analysis and Applications of Timed Service Protocols. ACM Transactions on Software Engineering and Methodology 19(4), art. no. 11 (2010)

    Google Scholar 

  10. Mokhtari-Aslaoui, K., Benbernou, S., Sahri, S., Andrikopoulos, V., Leymann, F., Hacid, M.-S.: Timed Privacy-Aware Business Protocols. International Journal of Cooperative Information Systems 21(2), 85–110 (2012)

    Article  Google Scholar 

  11. Hamadi, R., Paik, H.-Y., Benatallah, B.: Conceptual Modeling of Privacy-Aware Web Service Protocols. In: Krogstie, J., Opdahl, A.L., Sindre, G. (eds.) CAiSE 2007. LNCS, vol. 4495, pp. 233–248. Springer, Heidelberg (2007)

    Google Scholar 

  12. Samarati, P., de Vimercati, S.C.: Access Control: Policies, Models, and Mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 137–196. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  13. Elabd, E., Coquery, E., Hacid, M.-S.: Checking Compatibility and Replaceability in Web Services Business Protocols with Access Control. In: Proceedings of ICWS, pp. 409–416 (2010)

    Google Scholar 

  14. Elabd, E., Coquery, E., Hacid, M.-S.: From Implicit to Explicit Transitions in Business Protocols: A Semantic-Based Transformation. International Journal of Web Service Research 9(4), 69–95 (2012)

    Article  Google Scholar 

  15. Ponge, J., Benatallah, B., Casati, F., Toumani, F.: Fine-Grained Compatibility and Replaceability Analysis of Timed Web Service Protocols. In: Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.) ER 2007. LNCS, vol. 4801, pp. 599–614. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  16. Fensel, D.: Ontologies: Silver Bullet for Knowledge Management and Electronic Commerce. Springer (2003)

    Google Scholar 

  17. Nejdl, W., Olmedilla, D., Winslett, M., Zhang, C.C.: Ontology-Based Policy Specification and Management. In: GĂ³mez-PĂ©rez, A., Euzenat, J. (eds.) ESWC 2005. LNCS, vol. 3532, pp. 290–302. Springer, Heidelberg (2005)

    Google Scholar 

  18. Wei, L., et al.: Security and Privacy for Storage and Computation in Cloud Computing. Information Sciences 258, 371–386 (2014)

    Article  Google Scholar 

  19. Wei, L., et al.: SecCloud: Bridging Secure Storage and Computation in Cloud. In: Proceedings of ICDCS Workshops, pp. 52–61 (2010)

    Google Scholar 

  20. Reza Rahimi, M., et al.: MuSIC: Mobility-Aware Optimal Service Allocation in Mobile Cloud Computing. In: Proceedings of IEEE CLOUD, pp. 75–82 (2013)

    Google Scholar 

  21. Sheng, Q.Z., et al.: Web Services Composition: A Decade’s Overview. Information Sciences 280, 218–238 (2014)

    Article  Google Scholar 

  22. Duan, Q., et al.: A Survey on Service-Oriented Network Virtualization Toward Convergence of Networking and Cloud Computing. IEEE Transactions on Network and Service Management 9(4), 373–392 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Cuzzocrea, A., RodinĂ², V. (2014). Interoperability of Security-Aware Web Service Business Processes: Case Studies and Empirical Evaluation. In: Fortino, G., Di Fatta, G., Li, W., Ochoa, S., Cuzzocrea, A., Pathan, M. (eds) Internet and Distributed Computing Systems. IDCS 2014. Lecture Notes in Computer Science, vol 8729. Springer, Cham. https://doi.org/10.1007/978-3-319-11692-1_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11692-1_25

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11691-4

  • Online ISBN: 978-3-319-11692-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics