Skip to main content

Web Services Verification and Prudent Implementation

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7122))

Abstract

Alice&Bob notation is widely used to describe conversations between partners in security protocols. We present a tool that compiles an Alice&Bob description of a Web Services choreography into a set of servlets. For that we first compute for each partner an executable specification as prudent as possible of her role in the choreography. This specification is expressed in ASLan language, a formal language designed for modeling Web Services tied with security policies. Then we can check with automatic tools that this ASLan specification verifies some required security properties such as secrecy and authentication. If no flaw is found, we compile the specification into Java servlets that real partners can use to execute the choreography.

This work is supported by FP7 AVANTSSAR [2] and FP7 NESSoS [1] projects.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Network of Excellence on Engineering Secure Future Internet Software Services and Systems, NESSoS project, http://www.nessos-project.eu

  2. Automated Validation of Trust and Security of Service-Oriented Architectures, AVANTSSAR project (2008-2010), http://www.avantssar.eu

  3. AVANTSSAR. Deliverable 2.3: ASLan final version with dynamic service and policy composition (2010), http://www.avantssar.eu/pdf/deliverables/avantssar-d2-3.pdf

  4. AVANTSSAR. Deliverable 5.4: Assessment of the AVANTSSAR Validation Platform (2010), http://www.avantssar.eu

  5. AVANTSSAR. The AVANTSSAR Validation Platform (2010), http://www.avantssar.eu

  6. AVISPA. Deliverable 2.3: The Intermediate Format (2003), http://www.avispa-project.org

  7. Barros, A., Dumas, M., Oaks, P.: A Critical Overview of the Web Services Choreography Description Language (WS-CDL). BPTrends (2005)

    Google Scholar 

  8. Bhargavan, K., Corin, R., Deniélou, P.-M., Fournet, C., Leifer, J.J.: Cryptographic protocol synthesis and verification for multiparty sessions. In: Proceedings of the 2009 22nd IEEE Computer Security Foundations Symposium, pp. 124–140. IEEE Computer Society, Washington, DC (2009)

    Chapter  Google Scholar 

  9. Bieber, P.: A logic of communication in hostile environment. In: Proceedings of the Computer Security Foundations Workshop III, pp. 14–22 (June 1990)

    Google Scholar 

  10. Bultan, T., Su, J., Fu, X.: Analyzing conversations of web services. IEEE Internet Computing 10(1), 18–25 (2006)

    Article  Google Scholar 

  11. Carbone, M., Honda, K., Yoshida, N.: Structured Communication-Centred Programming for Web Services. In: De Nicola, R. (ed.) ESOP 2007. LNCS, vol. 4421, pp. 2–17. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  12. Carlsen, U.: Generating formal cryptographic protocol specifications. In: Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 137–146 (May 1994)

    Google Scholar 

  13. Chevalier, Y., Mekki, M.A., Rusinowitch, M.: Orchestration under security constraints. In: Sixth International Workshop on Formal Aspects in Security and Trust (FAST 2009), Eindhoven, the Netherlands, November 5-6 (2009)

    Google Scholar 

  14. Chevalier, Y., Mekki, M.A., Rusinowitch, M.: Automatic composition of services with security policies. In: Proceedings of the 2008 IEEE Congress on Services - Part I, SERVICES 2008, pp. 529–537. IEEE Computer Society, Washington, DC (2008)

    Chapter  Google Scholar 

  15. Chevalier, Y., Rusinowitch, M.: Compiling and securing cryptographic protocols. Inf. Process. Lett. 110(3), 116–122 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  16. Denker, G., Millen, J.: CAPSL integrated protocol environment. In: DARPA Information Survivability Conference (DISCEX 2000), pp. 207–221. IEEE Computer Society (2000)

    Google Scholar 

  17. Fabrega, F.J.T., Herzog, J.C., Guttman, J.D.: Strand spaces: why is a security protocol correct? In: Proceedings of the 1998 IEEE Symposium on Security and Privacy, pp. 160–171 (May 1998)

    Google Scholar 

  18. Guttman, J.D., Herzog, J.C., Ramsdell, J.D., Sniffen, B.T.: Programming Cryptographic Protocols. In: De Nicola, R., Sangiorgi, D. (eds.) TGC 2005. LNCS, vol. 3705, pp. 116–145. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  19. McCarthy, J., Krishnamurthi, S.: Trusted Multiplexing of Cryptographic Protocols. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol. 5983, pp. 217–232. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  20. Millen, J., Muller, F.: Cryptographic protocol generation from CAPSL. Technical Report SRI-CSL-01-07, SRI International (December 2001)

    Google Scholar 

  21. Mödersheim, S.: Algebraic properties in alice and bob notation. In: ARES, pp. 433–440. IEEE Computer Society (2009)

    Google Scholar 

  22. Turuani, M.: The CL-Atse Protocol Analyser. In: Pfenning, F. (ed.) RTA 2006. LNCS, vol. 4098, pp. 277–286. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  23. W3C Consortium. XML Path Language (XPath) 2.0, 2nd edn. December 14 (2010), http://www.w3.org/TR/xpath20/

  24. World Wide Web Consortium. Web Services Choreography Description Language Version 1.0, November 9 (2005), http://www.w3.org/TR/ws-cdl-10/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Avanesov, T., Chevalier, Y., Anis Mekki, M., Rusinowitch, M. (2012). Web Services Verification and Prudent Implementation. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds) Data Privacy Management and Autonomous Spontaneus Security. DPM SETOP 2011 2011. Lecture Notes in Computer Science, vol 7122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28879-1_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28879-1_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28878-4

  • Online ISBN: 978-3-642-28879-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics