Orchestration under Security Constraints
Identifieur interne : 002656 ( Main/Exploration ); précédent : 002655; suivant : 002657Orchestration under Security Constraints
Auteurs : Yannick Chevalier [France] ; Mohamed Anis Mekki [France] ; Michaël Rusinowitch [France]Source :
- Lecture Notes in Computer Science [ 0302-9743 ]
Abstract
Abstract: Automatic composition of web services is a challenging task. Many works have considered simplified automata models that abstract away from the structure of messages exchanged by the services. For the domain of secured services (using e.g. digital signing or timestamping) we propose a novel approach to automated composition of services based on their security policies. Given a community of services and a goal service, we reduce the problem of composing the goal from services in the community to a security problem where an intruder should intercept and redirect messages from the service community and a client service till reaching a satisfying state. We have implemented the algorithm in AVANTSSAR Platform [5] and applied the tool to several case studies.
Url:
DOI: 10.1007/978-3-642-25271-6_2
Affiliations:
Links toward previous steps (curation, corpus...)
- to stream Istex, to step Corpus: 000813
- to stream Istex, to step Curation: 000808
- to stream Istex, to step Checkpoint: 000556
- to stream Main, to step Merge: 002698
- to stream Main, to step Curation: 002656
Le document en format XML
<record><TEI wicri:istexFullTextTei="biblStruct"><teiHeader><fileDesc><titleStmt><title xml:lang="en">Orchestration under Security Constraints</title>
<author><name sortKey="Chevalier, Yannick" sort="Chevalier, Yannick" uniqKey="Chevalier Y" first="Yannick" last="Chevalier">Yannick Chevalier</name>
</author>
<author><name sortKey="Mekki, Mohamed Anis" sort="Mekki, Mohamed Anis" uniqKey="Mekki M" first="Mohamed Anis" last="Mekki">Mohamed Anis Mekki</name>
</author>
<author><name sortKey="Rusinowitch, Michael" sort="Rusinowitch, Michael" uniqKey="Rusinowitch M" first="Michaël" last="Rusinowitch">Michaël Rusinowitch</name>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:243013976C2470FD16FBAD19F2B48DF7D4DE8F88</idno>
<date when="2011" year="2011">2011</date>
<idno type="doi">10.1007/978-3-642-25271-6_2</idno>
<idno type="url">https://api.istex.fr/ark:/67375/HCB-5C3H58NL-Q/fulltext.pdf</idno>
<idno type="wicri:Area/Istex/Corpus">000813</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">000813</idno>
<idno type="wicri:Area/Istex/Curation">000808</idno>
<idno type="wicri:Area/Istex/Checkpoint">000556</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">000556</idno>
<idno type="wicri:doubleKey">0302-9743:2011:Chevalier Y:orchestration:under:security</idno>
<idno type="wicri:Area/Main/Merge">002698</idno>
<idno type="wicri:Area/Main/Curation">002656</idno>
<idno type="wicri:Area/Main/Exploration">002656</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title level="a" type="main" xml:lang="en">Orchestration under Security Constraints</title>
<author><name sortKey="Chevalier, Yannick" sort="Chevalier, Yannick" uniqKey="Chevalier Y" first="Yannick" last="Chevalier">Yannick Chevalier</name>
<affiliation wicri:level="1"><country xml:lang="fr">France</country>
<wicri:regionArea>LORIA & INRIA Nancy Grand Est</wicri:regionArea>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">France</country>
</affiliation>
</author>
<author><name sortKey="Mekki, Mohamed Anis" sort="Mekki, Mohamed Anis" uniqKey="Mekki M" first="Mohamed Anis" last="Mekki">Mohamed Anis Mekki</name>
<affiliation wicri:level="1"><country xml:lang="fr">France</country>
<wicri:regionArea>LORIA & INRIA Nancy Grand Est</wicri:regionArea>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">France</country>
</affiliation>
</author>
<author><name sortKey="Rusinowitch, Michael" sort="Rusinowitch, Michael" uniqKey="Rusinowitch M" first="Michaël" last="Rusinowitch">Michaël Rusinowitch</name>
<affiliation wicri:level="1"><country xml:lang="fr">France</country>
<wicri:regionArea>LORIA & INRIA Nancy Grand Est</wicri:regionArea>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">France</country>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series><title level="s" type="main" xml:lang="en">Lecture Notes in Computer Science</title>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt><idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass></textClass>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">Abstract: Automatic composition of web services is a challenging task. Many works have considered simplified automata models that abstract away from the structure of messages exchanged by the services. For the domain of secured services (using e.g. digital signing or timestamping) we propose a novel approach to automated composition of services based on their security policies. Given a community of services and a goal service, we reduce the problem of composing the goal from services in the community to a security problem where an intruder should intercept and redirect messages from the service community and a client service till reaching a satisfying state. We have implemented the algorithm in AVANTSSAR Platform [5] and applied the tool to several case studies.</div>
</front>
</TEI>
<affiliations><list><country><li>France</li>
</country>
</list>
<tree><country name="France"><noRegion><name sortKey="Chevalier, Yannick" sort="Chevalier, Yannick" uniqKey="Chevalier Y" first="Yannick" last="Chevalier">Yannick Chevalier</name>
</noRegion>
<name sortKey="Chevalier, Yannick" sort="Chevalier, Yannick" uniqKey="Chevalier Y" first="Yannick" last="Chevalier">Yannick Chevalier</name>
<name sortKey="Mekki, Mohamed Anis" sort="Mekki, Mohamed Anis" uniqKey="Mekki M" first="Mohamed Anis" last="Mekki">Mohamed Anis Mekki</name>
<name sortKey="Mekki, Mohamed Anis" sort="Mekki, Mohamed Anis" uniqKey="Mekki M" first="Mohamed Anis" last="Mekki">Mohamed Anis Mekki</name>
<name sortKey="Rusinowitch, Michael" sort="Rusinowitch, Michael" uniqKey="Rusinowitch M" first="Michaël" last="Rusinowitch">Michaël Rusinowitch</name>
<name sortKey="Rusinowitch, Michael" sort="Rusinowitch, Michael" uniqKey="Rusinowitch M" first="Michaël" last="Rusinowitch">Michaël Rusinowitch</name>
</country>
</tree>
</affiliations>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 002656 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 002656 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Wicri/Lorraine |area= InforLorV4 |flux= Main |étape= Exploration |type= RBID |clé= ISTEX:243013976C2470FD16FBAD19F2B48DF7D4DE8F88 |texte= Orchestration under Security Constraints }}
This area was generated with Dilib version V0.6.33. |