Facial reconstruction

Search LJMU Research Online

Browse Repository | Browse E-Theses

Modelling, Validating, and Ranking of Secure Service Compositions

Brucker, A and Zhou, B and Malmignati, F and Shi, Q and Merabti, M (2017) Modelling, Validating, and Ranking of Secure Service Compositions. Software: Practice and Experience. ISSN 0038-0644

[img] Text
2016-spe-scf.pdf - Accepted Version
Restricted to Repository staff only until 7 July 2018.

Download (1MB)

Abstract

In the world of large-scale applications, software-as-a-service (SaaS) in general and use of micro-services, in particular, is bringing service-oriented architectures (SOA) to a new level: systems in general and systems that interact with human users (e.g., socio-technical systems) in particular are built by composing micro-services that are developed independently and operated by different parties. At the same time, SaaS applications are used more and more widely by enterprises as well as public services for providing critical services, including those processing security or privacy of relevant data. Therefore providing secure and reliable service compositions is increasingly needed to ensure the success of SaaS solutions. Building such service compositions securely, is still an unsolved problem. In this paper, we present a framework for modelling, validating, and ranking secure service compositions that integrate both automated services as well as services that interact with humans. As a unique feature, our approach for ranking services integrates validated properties(e.g., based on the result of formally analysing the source code of a service implementation) as well as contractual properties that are part of the service-level-agreement and, thus, not necessarily ensured on a technical level.

Item Type: Article
Additional Information: This is the peer reviewed version of the following article: Brucker AD, Zhou B, Malmignati F, Shi Q, Merabti M, Modelling, validating, and ranking of secure service compositions. Softw Pract Exper. 2017;1–21. https://doi.org/10.1002/spe.2513, which has been published in final form at http://dx.doi.org/10.1002/spe.2513]. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Self-Archiving
Uncontrolled Keywords: 08 Information And Computing Sciences, 17 Psychology And Cognitive Sciences
Subjects: Q Science > QA Mathematics > QA76 Computer software
Divisions: Computer Science
Publisher: Wiley
Date Deposited: 30 May 2017 10:45
Last Modified: 12 Jul 2017 10:20
DOI or Identification number: 10.1002/spe.2513
URI: http://researchonline.ljmu.ac.uk/id/eprint/6598

Actions (login required)

View Item View Item