Filters








239,936 Hits in 3.5 sec

A Framework for Secure Service Composition

Achim D. Brucker, Francesco Malmignati, Madjid Merabti, Qi Shi, Bo Zhou
2013 2013 International Conference on Social Computing  
In this paper, we present a framework for secure service composition using a model-based approach for specifying, building, and executing composed services.  ...  As a unique feature, this framework integrates security requirements as a first class citizen and, thus, avoids the "security as an afterthought" paradigm.  ...  A SECURE SERVICE COMPOSITION FRAMEWORK A secure service composition framework should provide security at both design-time and runtime.  ... 
doi:10.1109/socialcom.2013.97 dblp:conf/socialcom/BruckerMMSZ13 fatcat:lvsqrqrgozew7j5tlividurc24

EPICS: A Framework for Enforcing Security Policies in Composite Web Services

Rohit Ranchal, Bharat Bhargava, Pelin Angin, Lotfi Ben Othmane
2018 IEEE Transactions on Services Computing  
With advances in cloud computing and the emergence of service marketplaces, the popularity of composite services marks a paradigm shift from single-domain monolithic systems to cross-domain distributed  ...  The clients lack options for specifying policies to control the sharing of their data and have to rely on service providers which provide limited selection of security and privacy preferences.  ...  Contributions & Paper Organization In this paper, we propose EPICS, a framework for enforcing security policies in composite Web services.  ... 
doi:10.1109/tsc.2018.2797277 fatcat:3x2qqm7f4vgrxk3sgwhnnceqym

Me-Services: A Framework for Secure & Personalized Discovery, Composition and Management of Services in Pervasive Environments [chapter]

Anupam Joshi, Timothy Finin, Yelena Yesha
2002 Lecture Notes in Computer Science  
In particular, we describe our ongoing projects that have used DAML for service discovery, service composition, data management, and trust based security in pervasive computing environments.  ...  In this paper, we present the use of semantically rich descriptions for devices to discover, and cooperate with, others in their vicinity.  ...  Conclusions We have described the work of the eBiquity group at UMBC toward building a framework that enables discovery, composition and management of services and information in a pervasive computing  ... 
doi:10.1007/3-540-36189-8_20 fatcat:jjfoovh5dne2piqlquyycnpe3y

Towards a framework of authentication and authorization patterns for ensuring availability in service composition

J.E.Y. Rosseboe, R. Braek
2006 First International Conference on Availability, Reliability and Security (ARES'06)  
We propose a novel framework of authentication and authorization patterns for securing access to services for authorized users only, and we demonstrate how the patterns can be dynamically composed with  ...  services using a policydriven approach.  ...  Humberto Nicolas Castejón, Øystein Haugen, Frank Alexander Kraemer, Mass Soldal Lund, Birger Møller-Pedersen, Ragnhild Kobro Runde, Richard Sanders, Ina Schieferdecker, Ketil Stølen, and Thomas Weigert for  ... 
doi:10.1109/ares.2006.135 dblp:conf/IEEEares/RosseboB06 fatcat:zzhqch4lkbdkhggaihs3x7u534

Adu, K.K. and Adjei, E. (2018). The phenomenon of data loss and cyber security issues in Ghana. Foresight, 20(2), 150–61. Ahmed, M.T.U., Bhuiya, N.I. and Rahman, M.M. (2017). A secure enterprise architecture focused on security and technology-transformation (SEAST), The 12th International Conference for Internet Technology and Secured Transactions, (ICITST-2017), Cambridge, UK, 11–4/12/2017. Alanazi, S.T., Anbar, M., Ebad, S.A., Karuppayah, S. and Al-Ani, H.A. (2020). Theory-based model and prediction analy ...

Emad Al Khoufi
2021 Basic and Applied Sciences - Scientific Journal of King Faisal University  
This finding helps to guide the treatment strategy for both genders.  ...  A significantly higher rate of diabetes was noted in females (62%) compared to males (48%) (p<0.012). Co-existing diabetes and hypertension was found in 70% of females as compared to 38% of males.  ...  Saudi guidelines for hypertension, published online in 2017, were used as a reference.  ... 
doi:10.37575/b/med/0038 fatcat:5h5phkn4jjfvfceg4xasfjxsmy

A Decade of Model Driven Web Services Composition Frameworks

Muhammad Qaiser Saleem
2014 Research Journal of Applied Sciences Engineering and Technology  
In this study, a survey is presented showing the progress made by these researchers in the area of service composition and discusses different services composition frameworks presented by the most prominent  ...  Mostly these frameworks are using the Model Driven Software Development approach to develop Web Information Systems and UML is used as a modelling language for business process modelling.  ...  To our understanding this framework facilitates the secure web services composition by providing necessary steps/phases for web services composition.  ... 
doi:10.19026/rjaset.7.795 fatcat:oj4sk3rj5zfe7l3hozzzb26a5e

SECTISSIMO: A Platform-Independent Framework for Security Services

Mukhtiar Memon, Michael Hafner, Ruth Breu
2008 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems  
We propose the SECTISSIMO framework: a layered approach for the modeling of security-critical, serviceoriented systems.  ...  One of the approaches to tackle the challenge is the use of powerful Security Modeling Frameworks based on tools to generate security executables.  ...  Service Component Architecture for Security Components to form a Composite tion and Auditing.  ... 
dblp:conf/models/MemonHB08 fatcat:kww752d2wfbhhmpqjejwjlyq2a

Secure scripting based composite application development: Framework, architecture, and implementation

Tom Dinkelaker, Alisdair Johnstone, Yuecel Karabulut, Ike Nassi
2007 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)  
To fill this gap, we developed a framework for the design and facilitation of security.  ...  The framework supports the automatic generation of security configuration and enforcement. As a proof-of-concept, we present an architecture and report the implementation status.  ...  SECURITY DEVELOPMENT FRAMEWORK We propose a framework for designing and facilitating security in scripting-based composite applications.  ... 
doi:10.1109/colcom.2007.4553815 dblp:conf/colcom/DinkelakerJKN07 fatcat:cbdeaw424fb33f3xmog6ws44de

On-demand provisioning of Cloud and Grid based infrastructure services for collaborative projects and groups

Yuri Demchenko, Cees de Laat, Jeroen Van der Ham, Mattijs Ghijsen, Volodymyr Yakovenko, Mihai Cristea
2011 2011 International Conference on Collaboration Technologies and Systems (CTS)  
infrastructure resources virtualisation and management, including description, discovery, modeling, composition and monitoring; and the Service Delivery Framework (SDF) that provides a basis for defining  ...  conceptual and methodological framework for developing dynamically configurable virtualised infrastructure services; the Infrastructure Services Modeling Framework (ISMF) that provides a basis for the  ...  The authors believe that the concepts proposed in this paper provide a good basis for further discussion among researchers on the definition of architectures for dynamically-configured virtualised infrastructure  ... 
doi:10.1109/cts.2011.5928675 dblp:conf/cts/DemchenkoHYLGC11 fatcat:erh3fx3o2jfqzkvqk52s5bggiq

The Aniketos Service Composition Framework [chapter]

Achim D. Brucker, Francesco Malmignati, Madjid Merabti, Qi Shi, Bo Zhou
2014 Lecture Notes in Computer Science  
In this chapter, we present a framework for secure service composition using a model-based approach for specifying, building, and executing composed services.  ...  As a unique feature, this framework integrates security requirements as a first class citizen and, thus, avoids the "security as an afterthought" paradigm.  ...  The Aniketos Secure Service Composition Framework Building secure and trustworthy composite services on top of a SOA is a challenging task.  ... 
doi:10.1007/978-3-319-13518-2_9 fatcat:zc3wdxyij5dmjmoqcmf72uhnfm

Security policy monitoring of BPMN-based service compositions

Muhammad Asim, Artsiom Yautsiukhin, Achim D. Brucker, Thar Baker, Qi Shi, Brett Lempereur
2018 Journal of Software: Evolution and Process  
CONCLUSIONS We have presented a monitoring framework for SOA-based systems, which is particularly tailored for detecting security, privacy, and trustworthiness violations of service compositions.  ...  Fig. 5 : 5 Security Policy Monitoring Framework Fig. 6 : 6 Service Composition Framework (SCF). Fig. 7 : 7 ConSpec Editor. Fig. 8 : 8 Rule Editor.  ... 
doi:10.1002/smr.1944 fatcat:4aumq2apsbfabej5h2mxbose44

Architectural Framework for Secure Composite Web Services

J. G.R.Sathiaseelan
2013 International Journal of Computer Applications  
Hence, a novel architectural framework is intended solely for the academic institutions with the aim of providing efficient and secure composite web services for the web users.  ...  The exorbitant growth in the field of web services technology has challenged the web developers, vendors and researchers to design and development a variety of enterprise web applications for diverse organizations  ...  As a consequence, an architectural framework is propose in this paper which is intended for the academic institutions with an aim of providing secure composite web services solely for the academic users  ... 
doi:10.5120/13211-0592 fatcat:gpimdfblizff5kg357chxpzeny

CRESCENT+: a self-protecting framework for reliable composite web service delivery

Islam Elgedawy, Sara Khurshid, Rahat Masood, Muhammad Awais Shibli
2018 Iran Journal of Computer Science  
To overcome such limitation, this paper extends CRESCENT and proposes CRES-CENT+; a self-protecting framework for reliable composite web service delivery.  ...  One way to ensure reliable and secure composite web service delivery is by making them autonomous (i.e., become selfmanaging services, where they can be self-organizing, self-healing, self-optimizing,  ...  Work in [6] proposes a framework for the secure execution of composite web services.  ... 
doi:10.1007/s42044-018-0008-3 fatcat:wp2p6gapjndafplewd43wxhgyy

Modelling, validating, and ranking of secure service compositions

Achim D. Brucker, Bo Zhou, Francesco Malmignati, Qi Shi, Madjid Merabti
2017 Software, Practice & Experience  
Modelling, Validating, and Ranking of Secure Service Compositions http://researchonline.ljmu.ac.uk/6598/ Article LJMU has developed LJMU Research Online for users to access the research output of the University  ...  We presented a practical approach for developing service-oriented systems. Our approach supports certain security properties following the "secure-by-design" paradigm.  ...  Overall, these experiences show that our approach is applicable to a wide range of application domains.  ... 
doi:10.1002/spe.2513 fatcat:gd4z5bvwrvdxpjeu3ph7p2gvdm

Security-Oriented Service Composition and Evolution

Jun Han, Khaled M. Khan
2006 2006 13th Asia Pacific Software Engineering Conference (APSEC'06)  
This paper introduces a framework for security-oriented software service composition and evolution.  ...  Key building blocks of the framework are a semantic model for specifying the security objectives and properties at the service and system levels, the negotiation and re-negotiation techniques for service  ...  A framework for service composition and evolution We enhance this framework with additional activities that are used to create security-aware service compositions and to support system evolution in all  ... 
doi:10.1109/apsec.2006.51 dblp:conf/apsec/HanK06 fatcat:2dgxklqwqvbide7nqnwzg2v2gi
« Previous Showing results 1 — 15 out of 239,936 results