Facial reconstruction

Search LJMU Research Online

Browse Repository | Browse E-Theses

Modelling, Validating, and Ranking of Secure Service Compositions

Brucker, A, Zhou, B, Malmignati, F, Shi, Q and Merabti, M (2017) Modelling, Validating, and Ranking of Secure Service Compositions. Software: Practice and Experience. ISSN 0038-0644

[img]
Preview
Text
2016-spe-scf.pdf - Accepted Version

Download (1MB) | Preview

Abstract

In the world of large-scale applications, software-as-a-service (SaaS) in general and use of micro-services, in particular, is bringing service-oriented architectures (SOA) to a new level: systems in general and systems that interact with human users (e.g., socio-technical systems) in particular are built by composing micro-services that are developed independently and operated by different parties. At the same time, SaaS applications are used more and more widely by enterprises as well as public services for providing critical services, including those processing security or privacy of relevant data. Therefore providing secure and reliable service compositions is increasingly needed to ensure the success of SaaS solutions. Building such service compositions securely, is still an unsolved problem. In this paper, we present a framework for modelling, validating, and ranking secure service compositions that integrate both automated services as well as services that interact with humans. As a unique feature, our approach for ranking services integrates validated properties(e.g., based on the result of formally analysing the source code of a service implementation) as well as contractual properties that are part of the service-level-agreement and, thus, not necessarily ensured on a technical level.

Item Type: Article
Additional Information: This is the peer reviewed version of the following article: Brucker AD, Zhou B, Malmignati F, Shi Q, Merabti M, Modelling, validating, and ranking of secure service compositions. Softw Pract Exper. 2017;1–21. https://doi.org/10.1002/spe.2513, which has been published in final form at http://dx.doi.org/10.1002/spe.2513]. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Self-Archiving
Uncontrolled Keywords: 08 Information And Computing Sciences, 17 Psychology And Cognitive Sciences
Subjects: Q Science > QA Mathematics > QA76 Computer software
Divisions: Computer Science & Mathematics
Publisher: Wiley
Date Deposited: 30 May 2017 10:45
Last Modified: 04 Sep 2021 03:56
DOI or ID number: 10.1002/spe.2513
URI: https://researchonline.ljmu.ac.uk/id/eprint/6598
View Item View Item