Orchestration under security constraints

  • Authors:
  • Yannick Chevalier;Mohamed Anis Mekki;Michaël Rusinowitch

  • Affiliations:
  • LORIA & INRIA Nancy Grand Est, France;LORIA & INRIA Nancy Grand Est, France;LORIA & INRIA Nancy Grand Est, France

  • Venue:
  • FMCO'10 Proceedings of the 9th international conference on Formal Methods for Components and Objects
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Automatic composition of web services is a challenging task. Many works have considered simplified automata models that abstract away from the structure of messages exchanged by the services. For the domain of secured services (using e.g. digital signing or timestamping) we propose a novel approach to automated composition of services based on their security policies. Given a community of services and a goal service, we reduce the problem of composing the goal from services in the community to a security problem where an intruder should intercept and redirect messages from the service community and a client service till reaching a satisfying state. We have implemented the algorithm in AVANTSSAR Platform [5] and applied the tool to several case studies.