Incorporating Security Requirements into Service Composition: From Modelling to Execution
ICSOC-ServiceWave '09 Proceedings of the 7th International Joint Conference on Service-Oriented Computing
Security-Aware Service Composition for End Users of Small Enterprises
Proceedings of the 2010 conference on New Trends in Software Methodologies, Tools and Techniques: Proceedings of the 9th SoMeT_10
Security-aware web service composition approaches: state-of-the-art
Proceedings of the 13th International Conference on Information Integration and Web-based Applications and Services
Semantic matching of WS-SecurityPolicy assertions
ICSOC'11 Proceedings of the 2011 international conference on Service-Oriented Computing
Towards an approach to design and enforce security in web service composition
International Journal of Web Engineering and Technology
Configuring private data management as access restrictions: from design to enforcement
ICSOC'12 Proceedings of the 10th international conference on Service-Oriented Computing
Rule-Based Security Capabilities Matching for Web Services
Wireless Personal Communications: An International Journal
Hi-index | 0.01 |
Typically, in areas such as e-business and e-government, among others, Web services are used as basic components for building business processes. Participants in a business process may have different computational platforms that should interoperate in order to achieve the process goals. This interoperability is supported by the Web service technology. Thus, the importance of the technology is growing and its use in these areas demands security concern. However, the current approach for building processes from services, based on the Web Services Business Process Execution Language (WS-BPEL), does not consider security. This paper proposes an approach for building processes according to provider capabilities and consumer security requirements. These characteristics are expressed using Web Services Policy Framework (WS-Policy) policies and a Web Ontology Language (OWL) ontology. The main contribution of this paper is the use of semantics-enriched security policies for enriching Web service business processes.