Skip to main content

Evolving Security Requirements in Multi-layered Service-Oriented-Architectures

  • Conference paper
Data Privacy Management and Autonomous Spontaneus Security (DPM 2011, SETOP 2011)

Abstract

Due to today’s rapidly changing corporate environments, business processes are increasingly subject to dynamic configuration and evolution. The evolution of new deployment architectures, as illustrated by the move towards mobile platforms and the Internet Of Services, and the introduction of new security regulations (imposed by national and international regulatory bodies, such as SOX or BASEL) are an important constraint in the design and development of business processes. In such a context, it is not sufficient to apply the corresponding adaptations only at the service orchestration or at the choreography level; there is also the need for controlling the impact of new security requirements to several architectural layers, specially in cloud computing, where the notion of Platforms as Services and Infrastructure as Services are fundamental. In this paper we survey several research questions related to security cross-domain and cross-layer security functionality in Service Oriented Architectures, from an original point of view. We provide the first insights on how a general service model empowered with aspect oriented programming capabilities can provide clean modularization to such cross-cutting security concerns.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akşit, M., Clarke, S., Elrad, T., Filman, R.E. (eds.): Aspect-Oriented Software Development. Addison-Wesley Professional (September 2004)

    Google Scholar 

  2. Bagheri, E., Ghorbani, A.: A service oriented approach to critical infrastructure modeling. In: Workshop on Service Oriented Techniques. National Research Council, Canada (2006)

    Google Scholar 

  3. Navarro, L.D.B., Südholt, M., Vanderperren, W., Verheecke, B.: Modularization of Distributed Web Services Using Aspects with Explicit Distribution (AWED). In: Meersman, R., Tari, Z. (eds.) OTM 2006. LNCS, vol. 4276, pp. 1449–1466. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  4. Charfi, A., Mezini, M.: Ao4bpel: An aspect-oriented extension to bpel. World Wide Web 10(3), 309–344 (2007)

    Article  Google Scholar 

  5. Chen, Q., Shen, J., Dong, Y., Dai, J., Xu, W.: Building a collaborative manufacturing system on an extensible soa-based platform. In: 10th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2006, pp. 1–6 (May 2006)

    Google Scholar 

  6. Courbis, C., Finkelstein, A.: Weaving aspects into web service orchestrations. In: ICWS 2005: Proceedings of the IEEE International Conference on Web Services, pp. 219–226. IEEE Computer Society, Washington, DC (2005)

    Chapter  Google Scholar 

  7. Idrees, M.S., Serme, G., Roudier, Y., et al.: State of the art and requirement analysis of security functionalities for soas. Deliverable D2.1, The CESSA project (July 2010), http://cessa.gforge.inria.fr/lib/exe/fetch.php?media=publication:d2-1.pdf

  8. Kiczales, G.: Aspect-oriented programming. ACM Comput. Surv. 28(4es), 154 (1996)

    Article  Google Scholar 

  9. Lagaisse, B., Joosen, W.: True and Transparent Distributed Composition of Aspect-Components. In: van Steen, M., Henning, M. (eds.) Middleware 2006. LNCS, vol. 4290, pp. 42–61. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  10. Lewis, G., Smith, D.: Service-oriented architecture and its implications for software maintenance and evolution. In: Frontiers of Software Maintenance, FoSM 2008, pp. 1–10 (September 2008)

    Google Scholar 

  11. Lowis, L., Accorsi, R.: On a classification approach for soa vulnerabilities. In: International Computer Software and Applications Conference, pp. 439–444 (2009)

    Google Scholar 

  12. Lowis, L., Accorsi, R.: Vulnerability analysis in soa-based business processes. IEEE Transactions on Services Computing 99(PrePrints) (2010)

    Google Scholar 

  13. Mingyan, Z., Yanzhang, W., Xiaodong, C., Kai, X.: Service-oriented dynamic evolution model. In: International Symposium on Computational Intelligence and Design, ISCID 2008, vol. 1, pp. 322–326 (October 2008)

    Google Scholar 

  14. OWASP. Open web application security project, https://www.owasp.org/index.php/category:attack

  15. Serme, G., Idrees, M.S., Roudier, Y., et al.: Compositional evolution of secure services using aspects. Deliverable D3.1, The CESSA project (July 2011), http://cessa.gforge.inria.fr/lib/exe/fetch.php?media=publications:d3-1.pdf

  16. Svirskas, A., Isacenkova, J., Molva, R.: Towards secure and trusted collaboration environment for European public sector. In: 2nd International Workshop on Trusted Collaboration, TrustCol 2007, New York, USA, November 12-15 (November 2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sabir Idrees, M., Serme, G., Roudier, Y., De Oliveira, A.S., Grall, H., Südholt, M. (2012). Evolving Security Requirements in Multi-layered Service-Oriented-Architectures. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds) Data Privacy Management and Autonomous Spontaneus Security. DPM SETOP 2011 2011. Lecture Notes in Computer Science, vol 7122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28879-1_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28879-1_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28878-4

  • Online ISBN: 978-3-642-28879-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics