Brucker, A, Zhou, B, Malmignati, F, Shi, Q and Merabti, M (2017) Modelling, Validating, and Ranking of Secure Service Compositions. Software: Practice and Experience. ISSN 0038-0644
|
Text
2016-spe-scf.pdf - Accepted Version Download (1MB) | Preview |
Abstract
In the world of large-scale applications, software-as-a-service (SaaS) in general and use of micro-services, in particular, is bringing service-oriented architectures (SOA) to a new level: systems in general and systems that interact with human users (e.g., socio-technical systems) in particular are built by composing micro-services that are developed independently and operated by different parties. At the same time, SaaS applications are used more and more widely by enterprises as well as public services for providing critical services, including those processing security or privacy of relevant data. Therefore providing secure and reliable service compositions is increasingly needed to ensure the success of SaaS solutions. Building such service compositions securely, is still an unsolved problem. In this paper, we present a framework for modelling, validating, and ranking secure service compositions that integrate both automated services as well as services that interact with humans. As a unique feature, our approach for ranking services integrates validated properties(e.g., based on the result of formally analysing the source code of a service implementation) as well as contractual properties that are part of the service-level-agreement and, thus, not necessarily ensured on a technical level.
Item Type: | Article |
---|---|
Additional Information: | This is the peer reviewed version of the following article: Brucker AD, Zhou B, Malmignati F, Shi Q, Merabti M, Modelling, validating, and ranking of secure service compositions. Softw Pract Exper. 2017;1–21. https://doi.org/10.1002/spe.2513, which has been published in final form at http://dx.doi.org/10.1002/spe.2513]. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Self-Archiving |
Uncontrolled Keywords: | 08 Information And Computing Sciences, 17 Psychology And Cognitive Sciences |
Subjects: | Q Science > QA Mathematics > QA76 Computer software |
Divisions: | Computer Science & Mathematics |
Publisher: | Wiley |
Date Deposited: | 30 May 2017 10:45 |
Last Modified: | 04 Sep 2021 03:56 |
DOI or ID number: | 10.1002/spe.2513 |
URI: | https://researchonline.ljmu.ac.uk/id/eprint/6598 |
View Item |